Difference between revisions of "Low Integrity Code Generation"

From MgmtWiki
Jump to: navigation, search
(Context)
(Context)
Line 15: Line 15:
 
** https://github.com/whatwg/fs/
 
** https://github.com/whatwg/fs/
 
** https://github.com/WICG/file-system-access
 
** https://github.com/WICG/file-system-access
 +
** [https://fs.spec.whatwg.org/ File System - living standard]
  
 
===Mandatory Integrity Checking (MIC)===
 
===Mandatory Integrity Checking (MIC)===

Revision as of 13:38, 9 March 2023

Full Title or Meme

The effort to create fully functional Web Apps has led to changes in the functionality of the browser sandbox to allow functionality, like FILE API, that can easily be exploited to create high integrity applications with low integrity code files.

Author: Tom Jones (This is a personal opinion that should not be attributed to any of my employers.)

Last Update: 2023-03-03

Context

The W3C WICG (web incubation community Group) - from the charter[1]

Mandatory Integrity Checking (MIC)

Problems

Any Web App that deals with low-integrity data should be allowed to impact high-integrity functionality. The example used here is VSCode, a Microsoft code generation application, but any Web App that transitions low-integrity input to high-integrity output would have the same issues.

VS Code

Migrating VS Code to Process Sandboxing describes the process of moving a (initially) 12 MB code generation platform to the use of ONLY low-integrity source code.

Solution

Stop trying to make Web Apps into high-integrity solutions providers.

References

  1. W3C Web Incubator Community Group Charter (2023-02-22) https://wicg.github.io/admin/charter.html