Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate: potential ways of preventing malicious contracts from being loaded #2115

Open
taoeffect opened this issue Jun 24, 2024 · 0 comments
Assignees
Labels
Kind:Core Anything that changes or affects the fundamental core data structures & design of the application. Note:Question Note:Research Note:Security Priority:High

Comments

@taoeffect
Copy link
Member

Problem

It is possible for someone to upload both contracts and contract manifests as files to the server, and then, for example, using either a malicious invite link (that references a groupid that uses these manifests), or possibly by registering their username with a modified identity contract, to get malicious contracts to load on the client.

Solution

Look into ways to restrict contract manifests from being uploaded by users, so that only the developers are apps are allowed to define contract manifests for their apps.

@taoeffect taoeffect added Note:Question Note:Security Priority:High Note:Research Kind:Core Anything that changes or affects the fundamental core data structures & design of the application. labels Jun 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Kind:Core Anything that changes or affects the fundamental core data structures & design of the application. Note:Question Note:Research Note:Security Priority:High
Projects
None yet
Development

No branches or pull requests

2 participants