serokell / xrefcheck

Check cross-references in repository documents
Mozilla Public License 2.0
54 stars 3 forks source link

Think over potential attack vectors #256

Open Martoon-00 opened 1 year ago

Martoon-00 commented 1 year ago

Clarification and motivation

When user runs xrefcheck, he does not think much about which links will fall under verification.

It may happen that the user forgot to exclude node_modules, and as result we went scanning half of the npm's world packages. Some of them may contain links referring to bad or even malicious sites, some may contain megabyte .md files. We should be ready to this and not cause any harm to the user's machine or CI.

So let's go thoroughly over the code and think about potential attack vectors; probably gather them in some document (and expect it to be really large. We already took care about some potential problems like redirect loops and links referring outside of the repository, but we should think more.

Acceptance criteria