Skip to content
Prev 44708 / 63421 Next

Scanning a R script for potentially insidious commands

On Dec 19, 2012, at 11:21 AM, Gabriel Becker wrote:

            
It is a good example of false security. For the reasons mentioned before this doesn't work and can be circumvented:
_developer:*:204:
_locationd:*:205:
_carddav:*:206:
_detachedsig:*:207:
_trustevaluationagent:*:208:
_odchpass:*:209:
_timezone:*:210:
_lda:*:211:
_cvms:*:212:
_usbmuxd:*:213:
[1] 0

The problem is that you can try to plug holes (and sandboxR is trying hard to plug a lot of them), but there will always be new ones. It's simply the wrong approach IMHO.

Cheers,
Simon