-
Notifications
You must be signed in to change notification settings - Fork 93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Neuter Cargo projects extracted from crate files #381
Comments
Oh. Good idea. |
@kornelski I'm looking at 836d46c and I wonder how do you make sure to generate a checksum of the original source code exactly, pre-sanitization. |
I don't. That is just the |
but perhaps the activity check flag shouldn't be a flag, but the digest? |
I think it will make things slightly more complicated, and then the assumption is that the computer your reviewing on is trusted. Otherwise no amount of precautions can prevent signing off malicious code. |
I have vague memory that there was some comparison being done between the dir that was used to review and a freshly downloaded one. Possibly for both: displaying unclean package directory notification and final Just raising this to your awareness. Please excuse me if I'm misremembering. BTW. Awesome work you're doing with lib.rs and crev development. |
Crates may execute arbitrary code at build time. Such code could attack reviewer's machine and manipulate crev.
The problem is that cargo-crev has an option to open a crate in editor, and fancy editors may automatically run
cargo check
or rust-analyzer on the untrusted code!cargo-crev should do something to prevent that, e.g.
Cargo.toml
toCargo-dont-get-pwned.toml
The text was updated successfully, but these errors were encountered: