From 399fb500f488fdadb64bed62dbee591838d8636e Mon Sep 17 00:00:00 2001 From: "Kartik K. Agaram" Date: Sat, 25 Dec 2021 14:00:03 -0800 Subject: more sandboxing scenarios --- sandboxing/README.md | 9 +++++++++ 1 file changed, 9 insertions(+) (limited to 'sandboxing/README.md') diff --git a/sandboxing/README.md b/sandboxing/README.md index ed0a9ea..ab3adf3 100644 --- a/sandboxing/README.md +++ b/sandboxing/README.md @@ -8,6 +8,15 @@ doesn't invoke any OS syscalls. ## Top down Things to secure: +* screen? Keep apps from drawing over standard Teliva UI elements. + * Teliva currently doesn't stop apps from overwriting the menu, if they're + clever. However, it always redraws its UI elements before accepting any + input from the keyboard. + +* code? There are currently no protections against .tlv files clobbering + existing definitions. I'm hoping that disallowing native code keeps this + safe. Apps can only affect themselves. + * files opened (for read/write) on file system * `io_open` * `io_lines` -- cgit 1.4.1-2-gfad0