FYI we have created https://github.com/Tirasa/groovy-security-sandbox
by forking https://github.com/jenkinsci/groovy-sandbox with some goodies from the sibling fork https://github.com/craftercms/groovy-sandbox and some polish. The library was applied to Syncope in https://github.com/apache/syncope/commit/8b08c4d5785599a0e38830dcff89738b93f02a16 and ConnId (supporting framework for provisioning) in https://github.com/Tirasa/ConnId/commit/bc4f4a3b3a424c2f1431fafe0a507f4a5ff17ba7 Regards. On 2025/08/17 07:12:09 Francesco Chicchiriccò wrote: > Hi Paul, > thank you for your answer. > > About sandbox, what do you think about [3] or [4]? Both seems to be quite > active, license-compliant and available from Maven Central. > > Also, do you have any example of ImportCustomizer / SecureASTCustomizer to > start from? I have only found [5] so far. > > Regards. > > [3] https://github.com/dalet-oss/groovy-sandbox > [4] https://github.com/craftercms/groovy-sandbox > [5] > https://github.com/jenkinsci/script-security-plugin/blob/master/src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/RejectASTTransformsCustomizer.java > > On 2025/08/16 21:31:36 Paul King wrote: > > Step 4 in your reference [2] is the key. > > > > You can provide an ImportCustomizer and a SecureASTCustomizer to limit > > imports and prohibit statements like "System.exit()". As mentioned in that > > article, that doesn't stop folks potentially using reflection or other > > tricks to execute the exit() statement. You can start trying to lock down > > such statements too. It becomes increasingly tricky to block all of the > > tricks without crippling what your users may legitimately want to execute. > > So, having a sandbox is the next step. > > > > Using the security manager with a policy file, also mentioned in that > > reference, has gone out of vogue and isn't supported in the latest JDKs. > > You'd more typically use a VM these days and set up a machine where it > > didn't matter if a script somehow managed to read the /etc/passwd file (or > > whatever). > > > > We have been meaning to document best practices for a sandbox environment > > but haven't found the cycles yet. We'd be super keen to work with you to > > write something up if you make progress. > > > > Cheers, Paul. > > > > > > On Sat, Aug 16, 2025 at 5:13 PM Francesco Chicchiriccò <ilgro...@apache.org> > > wrote: > > > > > Hi team, > > > Syncope is offering the possibility to extend / customize the base > > > behavior on every deployment by allowing to provide custom implementations > > > of a few Java interfaces; such implementations can be provided either as > > > Java or Groovy classes [1], with the latter being particularly attractive > > > as the machinery is set for runtime reload. > > > > > > I was wondering if there is any best-practice available to limit what > > > could be done by Groovy classes (e.g. System.exit, spawning new processes, > > > etc.). > > > I found [2] and a few other references which looks anyway either old or > > > not for general purpose. > > > > > > Can you suggest something else? > > > > > > TIA > > > Regards. > > > > > > [1] > > > https://syncope.apache.org/docs/4.0/reference-guide.html#implementations > > > [2] > > > https://levelup.gitconnected.com/secure-groovy-script-execution-in-a-sandbox-ea39f80ee87 > > > > > > -- > > > Francesco Chicchiriccò > > > > > > Tirasa - Open Source Excellence > > > http://www.tirasa.net/ > > > > > > Member at The Apache Software Foundation > > > Syncope, Cocoon, Olingo, CXF, OpenJPA > > > https://about.me/ilgrosso > > > > > > > > >