在线时间:8:00-16:00
迪恩网络APP
随时随地掌握行业动态
扫描二维码
关注迪恩网络微信公众号
开源软件名称(OpenSource Name):kikito/lua-sandbox开源软件地址(OpenSource Url):https://github.com/kikito/lua-sandbox开源编程语言(OpenSource Language):Lua 100.0%开源软件介绍(OpenSource Introduction):sandbox.luaA pure-lua solution for running untrusted Lua code. The default behavior is restricting access to "dangerous" functions in Lua, such as It's possible to provide extra functions via the Infinite loops are prevented via the Supported Lua versions:All the features of sandbox.lua work in the following Lua environments:
UsageRequire the module like this: local sandbox = require 'sandbox' Then you can use sandbox.run(code, options, ...)
Any extra parameters will just be passed to the sandboxed function when executed, and available on the top-level scope via the In other words, Notice that if local ok, result = pcall(sandbox.run, 'error("this just throws an error")') sandbox.protect(code, options)
The resulting sandboxed function works as regular functions as long as they don't access any insecure features: local sandboxed_f = sandbox(function() return 'hey' end)
local msg = sandboxed_f() -- msg is now 'hey' Sandboxed options can not access unsafe Lua modules. (See the source code for a list) When a sandboxed function tries to access an unsafe module, an error is produced. local sf = sandbox.protect([[
os.execute('rm -rf /') -- this will throw an error, no damage done
end
]])
sf() -- error: os.execute not found Sandboxed code will eventually throw an error if it contains infinite loops (note: this feature is not available in LuaJIT): local sf = sandbox.protect([[
while true do end
]])
sf() -- error: quota exceeded BytecodeIt is possible to exit a sandbox using specially-crafted Lua bytecode. References:
Because of this, the sandbox deactivates bytecode in all the versions of Lua where it is possible:
In other words, all except PUC-Rio Lua 5.1. ** The sandbox can be exploited in PUC-Rio Lua 5.1 via bytecode ** The only reason we keep Lua 5.1 in the list of supported versions of Lua is because sandboxing can help against users attempting to delete a file by mistake. It does not provide protection against malicious users. As a result we strongly recommend updating to a more recent version when possible. options.quotaNote: This feature is not available in LuaJIT
This limit can be tweaked via the It is not possible to exhaust the machine with infinite loops; the following will throw an error after invoking 500000 instructions: sandbox.run('while true do end') -- raise errors after 500000 instructions
sandbox.run('while true do end', {quota=10000}) -- raise error after 10000 instructions If the quota is low enough, sandboxed code with too many calculations might fail: local code = [[
local count = 1
for i=1, 400 do count = count + 1 end
return count
]]
sandbox.run(code, {quota=100}) -- raises error before the code ends If you want to turn off the quota completely, pass options.envUse the
The Through side effects, like writing to a database. You will have to provide the side-effects functions in
Through returned values:
InstallationJust copy sandbox.lua wherever you need it. Alternatively, you can use luarocks:
LicenseThis library is released under the MIT license. See MIT-LICENSE.txt for details SpecsThis project uses busted for its specs. In order to run them, install it and then:
|
2023-10-27
2022-08-15
2022-08-17
2022-09-23
2022-08-13
请发表评论