Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    primarykey
    data
    text
    singulars
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. VO
      singulars
      1. This table or related slice is empty.
    2. VO
      singulars
      1. This table or related slice is empty.
    3. VO
      singulars
      1. This table or related slice is empty.
    1. CO@Rook Actually, you're wrong. It's not even encryption, it's authentication. It's the same technique that Amazon AWS uses. More technically, it's not a "crypto magic wand", it's a legitimate means of securing any front-facing REST API. It doesn't matter what is used as an HMAC secret. Hop on any random text generator and use the first 30 characters or so, it doesn't matter. Though you've made it apparent that you don't understand very much about security.
      singulars
    2. CO@mattbasta crypto is short for cryptography and a cryptographic hash function such as sha256 falls under this category. Clearly security is a very in depth topic and everyone has more to learn. But in short i strongly dislike this approach to managing a remote code execution vulnerability. There is a good quote "If eval() is the answer then you are asking the wrong question". There is absolutely no good reason for someone to be executing code like this. It is likely that the OP is taking a short cut and he will be burned by this partial answer.
      singulars
    3. CO@Rook For the last time, it is not a vulnerability. There is no "eval", as the code is running in an environment with literally nothing to break. There is literally no means of modifying sensitive information, accessing the disk, or making outbound requests. That's the idea behind a sandbox: clearly a topic that your security professor must have skimmed over. Sure, executing code in an `eval` statement is bad, but if the OP wants to run a user's JS, then running it in a sandboxed setting is the safest and most effective means of achieving that goal. Name one vulnerability exposed by a sandbox.
      singulars
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload