Skip to content

Harden sandbox run security boundaries #28

@chubes4

Description

@chubes4

Gap

The current WordPress plugin runner shells out to the local CLI and accepts low-level inputs. That is fine for prototype/operator use, but not enough for frontend or hosted-product use.

Goal

Harden sandbox execution so chat/frontend users can request coding tasks without gaining host shell, arbitrary path, or parent-site mutation access.

Acceptance direction

  • Restrict executable path to configured allow-list.
  • Restrict component paths and artifact paths to configured allow-lists.
  • Add task timeouts, process cleanup, concurrency limits, and quotas.
  • Remove/lock down arbitrary code input from frontend-facing task APIs.
  • Add audit logging for sandbox run requests and results.
  • Add structured denial errors for path, command, quota, timeout, and permission failures.
  • Ensure artifacts do not contain secrets.

Notes

This is prerequisite work before exposing sandbox runs to untrusted frontend users.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions