Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions .jules/sentinel.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,3 +2,8 @@
**Vulnerability:** API endpoints in `backend/src/server.ts` taking user input (`projectId`, `jobId`) were directly joined with paths using `join` in `backend/src/store/localStore.ts` without proper sanitization. This allowed attackers to escape the project directory context and overwrite or read arbitrary files by sending payload containing `../` sequences.
**Learning:** Even internal backend services handling project resources must securely sanitize all parameter values used for file operations to prevent path traversal outside expected boundaries.
**Prevention:** Always use safe path sanitization utilities, like the implemented `safeJoin` and `toSafeRelativePath` in `backend/src/utils/path.ts`, to securely construct file paths and ensure the final path remains within the intended boundaries.

## 2025-02-18 - [Command Option Injection in Compilation Worker]
**Vulnerability:** The `mainFile` parameter in `backend/src/services/compileQueue.ts` was not validated to ensure it didn't start with a hyphen (`-`). This allowed an attacker to inject command options (e.g., `-shell-escape`) to the `latexmk` command spawned by the Rust compile worker, leading to potential command execution or server compromise.
**Learning:** Always validate user-provided input that is passed as positional arguments to external commands or processes, explicitly rejecting inputs that look like options/flags (starting with `-` or `--`).
**Prevention:** Explicitly reject `mainFile` values starting with a hyphen in the compilation queue service before they reach the compile worker.
5 changes: 5 additions & 0 deletions backend/src/services/compileQueue.ts
Original file line number Diff line number Diff line change
Expand Up @@ -104,6 +104,11 @@ export class CompileQueueService {
const timeoutMs = request.timeoutMs ?? settings.compileTimeoutMs;
const jobId = createId("job");

// πŸ›‘οΈ Sentinel: Prevent command option injection (e.g., -shell-escape)
if (mainFile.startsWith("-")) {
throw new HttpError(400, "mainFile cannot start with a hyphen.");
}

if (this.queue.length >= MAX_QUEUE_ITEMS) {
throw new HttpError(429, "Compile queue is full.");
}
Expand Down