Since run_path executes python scripts in the given python file, what will be our security modal to prevent someone from targeting predicate policies as a way to execute malicious codes?
The policies will be managed by administrators and the case may be similar to "admins have super access anyway". But consider a scenario where predicate is set up in CI/CD to deploy policies, anyone with push access to that pipeline can add a new policy file to trigger custom code inside CI runtime. Or maybe just trick policy admins to test a custom policy file and pwn their machine.
Since
run_path
executes python scripts in the given python file, what will be our security modal to prevent someone from targeting predicate policies as a way to execute malicious codes?The policies will be managed by administrators and the case may be similar to "admins have super access anyway". But consider a scenario where predicate is set up in CI/CD to deploy policies, anyone with push access to that pipeline can add a new policy file to trigger custom code inside CI runtime. Or maybe just trick policy admins to test a custom policy file and pwn their machine.
Are there other secure alternative to
run_path
?