We probably should limit FSAS to just a few "reasonably safe" directories, as it can be easily used to circumvent the filesystem veil. Afterall, if a program really really wants to access critical system files, it probably should include them in the initial veil as well.
Currently, Ladybird has virtually unlimited read-access to everything the user can read:
This feels like a bad idea. Why bother putting up a veil, when all the data is just one IPC call away?
I suggest that we only whitelist the following directories:
$HOME
/res
(because that's where all our example-html lives)/tmp/
(in case the user uses that directory to handle files)/usr/
(Tests, include files, shared libraries, installed ports, and a copy of the entire serenity source code live here)This would mean that the following directories would become inaccessible through FileSystemAccessServer:
/bin/
/dev/
/etc/
/mnt/
/proc/
/sys/
/var/
β contains only /var/run/utmp
at the moment/www/
β these files should be served by WebServerAs far as I can see, the following programs currently use this promptless mechanism by FSAS:
file://
)None of these applications have any business reading directly from the above-mentioned "would become inaccessible" directories. Let me know what you think!
Pay now to fund the work behind this issue.
Get updates on progress being made.
Maintainer is rewarded once the issue is completed.
You're funding impactful open source efforts
You want to contribute to this effort
You want to get funding like this too