our bug findings are always rejected #28570
dzakyzak71
started this conversation in
Show and tell
Replies: 1 comment 1 reply
-
|
Thanks for the detailed report including POC. The misalignment here is in the understanding of Bazel's threat model. As noted by the security team, Bazel is designed to execute user-provided code. When a user runs bazel build on untrusted code the repository already has multiple intended pathways to execute ~arbitrary code. If users want to be fully safe, they need to make sure to build and run untrusted coded in a sandboxed environment where no secrets are present. That being said, PRs to improve the robustness or URI parsing or path normalization are welcome as general code improvements. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
We filed a bug report with the VRP team
titled: Bazel Remote Cache Credential Exfiltration via Workspace Configuration Injection and Path Traversal in Bazel mini_tar Allows Writing Files Outside the Extraction Directory.
Bazel Remote Cache Credential Exfiltration via Workspace Configuration Injection
Response from the VRP team
what is our mistake?
Beta Was this translation helpful? Give feedback.
All reactions