You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm running playwright in a Glitch app but it won't work unless I run under --no-sandbox and --disable-setuid-sandbox flags. Everywhere says this is insecure but I can't find any documentation or examples on why or how running under these flags is dangerous. Could someone provide some example code showing how these flags enable exploitation?
What specifically are the dangers? Memory and CPU consumption? Can secret server files somehow be accessed? Security issuers are different than performance issues so I'd like to know what some tests are I could run to see if there are other ways to mitigate the actual issues everyone seems to think are there but never show what.
Thanks!
The text was updated successfully, but these errors were encountered:
This is really interesting and helpful though I would still love to see a specific example or scenario where not using a sandbox opens up X vulnerability through Y code while using a sandbox mitigates that risk.
@tyvdh : tl/dr is quite straightforward. With no sandbox, if you open a malicious site that you do not control that actively tries to exploit some of the chromium vulnerabilities, it can gain full access to your user session. It will be able to do things that the logged in user can do.
So disabling the sandbox is only Ok when you either
trust the web content you open. I.e. that's your own site that does not load random untrusted iframes.
you open untrusted content, but your browser is running in a restricted environment such as a virtual machine and there is no secret data siting next to it.
I'm running playwright in a Glitch app but it won't work unless I run under
--no-sandbox
and--disable-setuid-sandbox
flags. Everywhere says this is insecure but I can't find any documentation or examples on why or how running under these flags is dangerous. Could someone provide some example code showing how these flags enable exploitation?What specifically are the dangers? Memory and CPU consumption? Can secret server files somehow be accessed? Security issuers are different than performance issues so I'd like to know what some tests are I could run to see if there are other ways to mitigate the actual issues everyone seems to think are there but never show what.
Thanks!
The text was updated successfully, but these errors were encountered: