With tighter sandbox restrictions hitting release in 57, I thought it might be a good time to provide some tips on writing IPC in a safe way. Our sandbox is less effective if we punch holes in it through due to IPC bugs or overly permissive APIs. This document highlights some of the common issues we have come across during our work to audit Firefox IPC mechanisms for sandboxing escapes. These type of bugs aren't very common, but the anti-patterns that lead to these type of bugs fall into a few categories, and hopefully this document will help you avoid them.
https://wiki.mozilla.org/Security/Sandbox/IPCguide NB: these are general guidelines - often its Not That Simple (tm). Help is at hand - either my team, or the Content Isolation team (Jim Mathies) are always interested to talk sandboxing. Big thank you to Julian Hector for writing this, and to the Content Isolation team and others for their input and review. Feedback, corrections, suggestions all welcome. Regards, Paul Theriault Firefox Security Assurance _______________________________________________ dev-platform mailing list [email protected] https://lists.mozilla.org/listinfo/dev-platform

