Skip to content

gnovm: add syscall filtering to ensure no Virtual Machine escapes from exploits and vulnerabilities #3613

@odeke-em

Description

@odeke-em

Description

For the promises and security guarantees of a smart contracting language and platform, we need to ensure that if we promise that network calls or filesystem manipulation calls etc cannot be made by a call within the VM that we actually restrict related syscalls.

The Linux kernel provides “seccomp” for which there are Go bindings https://pkg.go.dev/github.com/seccomp/libseccomp-golang which we can use to restrict such calls and then log such attempts too and then increase security.

Firstly we should figure out what abilities that we want the gnovm to have and exclude everything else and build on what needs to be permitted.

Metadata

Metadata

Assignees

No one assigned

    Labels

    🌱 featureNew update to GnosecuritySecurity-sensitive issue

    Projects

    Status

    Triage

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions