mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #2666] Why there are no profiles for pip and npm? #1681
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1681
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @dandelionred on GitHub (Apr 26, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2666
Installing a package with both pip and npm is not just download & extract:
pip install xruns x's setup.pynpm install xruns scripts listed in x's package.json'sscriptsfield (the behavior can be disabled with--ignore-scriptsthough)Both pip and npm repositories are not checked for malware by some authority, malware is pretty possible there (for example this https://searchsecurity.techtarget.com/news/252453398/Compromised-NPM-package-highlights-open-source-trouble).
Don't we need to cover npm and pip by firejail out of the box?
// I'm not into ruby but probably gems installing poses the same issue.
@rusty-snake commented on GitHub (Apr 26, 2019):
Because no one has written it yet.
You are right about the fact that there are a lot of attack ways via pip and npm, but a profile for e.g. pip should be very lax as you never know what the different setup.py's need.
If you execute malware on your system you've lost. So you have to check if you can trust a package or not.
@Fred-Barclay commented on GitHub (Apr 28, 2019):
To add to what @rusty-snake says, IMHO any profile that actually works for pip would be too lose to offer any meaningful security and would only give a false sense of security. Probably better to not have a pip profile than for folks to think that they can just abandon reasonable precautions and use a super-weak profile while believing they're safe.
I don't know much about npm though
@dandelionred commented on GitHub (Apr 28, 2019):
I've got your point, guys, thanks for comments. There is no issue then.