Oh, and to be clear, our intent here is to implement the same API that Node.js currently exposes.
``` import { serialize, deserialize } from 'node:v8'; const data = serialize({ a: 'foo' }); const value = deserialize(data); ``` ``` import { Serializer, Deserializer } from 'node:v8'; const ser = new Serializer(); ser.writeHeader(); ser.writeValue({ a: 'foo' }); const des = new Deserializer(ser.releaseBuffer()); des.readHeader(); console.log(des.readValue()); ``` On Thursday, June 29, 2023 at 7:28:44 AM UTC-7 Kenton Varda wrote: > Hi v8-dev, > > We (Cloudflare Workers team) are wondering how V8 feels about the security > of the ValueDeserializer API. Do you believe it's safe to parse > possibly-malicious input with this? My understanding is that Chrome does > not provide any way to input attacker-controlled bytes to the API today, so > wasn't sure if it's designed for that. > > I ask because we'd like to expose V8 serialization in Cloudflare Workers > for compatibility with Node.js, which already exposes this. But our threat > model is very different from Node, such that we care a lot more about the > security of the V8 sandbox. > > Relatedly, is ValueDeserializer covered by fuzzing today? > > Thanks, > -Kenton > -- -- v8-dev mailing list v8-dev@googlegroups.com http://groups.google.com/group/v8-dev --- You received this message because you are subscribed to the Google Groups "v8-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to v8-dev+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/v8-dev/d468377d-1f45-40eb-ba75-06d519fbe609n%40googlegroups.com.