This section includes everything that is outside of the source code but is still critical to the security of the product that is being created. Because the issues covered by this kingdom are not directly related to source code, we separated it from the rest of the kingdoms.
ADD/COPY
command, an attacker can recreate each docker layer to obtain the information.Volumes
also can expose sensitive directories. If you need to use Volumes
to persist data, avoid mounting sensitive directories.delegatecall
to call into a potentially untrusted contract.delegatecall
causes the code at the target address to be executed in the context of the calling address. delegatecall
effectively enables the smart contract to dynamically load code from a different address at runtime, which is dangerous as the code at the target address can change any storage values and potentially take full control over the caller's balance.delegatecall
to execute code in the context of the calling address.
function forward(address callee, bytes _data) public {
require(callee.delegatecall(_data));
}
Example 2: The following ASPX code enables the automatic redirect of all ASP.NET framework script requests to the Microsoft Ajax CDN:
...
<script src="http://ajax.microsoft.com/ajax/jquery/jquery-1.4.2.min.js" type="text/javascript"></script>
...
...
<asp:ScriptManager
ID="ScriptManager1"
EnableCdn="true"
Runat="Server" />
...
Example 2
, the ScriptManager
control configures its ASPX page to automatically redirect any script requests to the appropriate CDN.services-config.xml
descriptor file specifies a "Logging" XML element to describe various aspects of logging. It looks like the following:
<logging>
<target class="flex.messaging.log.ConsoleTarget" level="Debug">
<properties>
<prefix>[BlazeDS]</prefix>
<includeDate>false</includeDate>
<includeTime>false</includeTime>
<includeLevel>false</includeLevel>
<includeCategory>false</includeCategory>
</properties>
<filters>
<pattern>Endpoint.*</pattern>
<pattern>Service.*</pattern>
<pattern>Configuration</pattern>
</filters>
</target>
</logging>
target
tag takes an optional attribute called level
, which indicates the log level. If the debug level is set to too detailed a level, your application may write sensitive data to the log file.allUsers
and allAuthenticatedUsers
gives anyone access to sensitive data.state
to off
in the dnssec_config
block.
resource "google_dns_managed_zone" "zone-demo" {
...
dnssec_config {
state = "off"
...
}
...
}
allUsers
or allAuthenticatedUsers
a Cloud KMS CryptoKey role gives anyone access to sensitive data.enabled
to false
.
resource "google_sql_database_instance" "database_instance_demo" {
...
settings {
backup_configuration {
enabled = false
...
}
}
}
value
to 0.0.0.0/0
in the authorized_networks
block. A CIDR block of /0
accepts connections from any IP address between 0.0.0.0 and 255.255.255.255.
resource "google_sql_database_instance" "db-demo" {
...
settings {
...
ip_configuration {
...
authorized_networks {
name = "any ip"
value = "0.0.0.0/0"
}
...
}
...
}
...
}
allUsers
or allAuthenticatedUsers
a Cloud Storage role gives anyone access to sensitive data.uniform_bucket_level_access
to false
.
resource "google_storage_bucket" "bucket-demo" {
...
uniform_bucket_level_access = false
...
}
enable-oslogin
to false
in the metadata
argument.
resource "google_compute_instance" "compute-instance-demo" {
...
metadata = {
enable-oslogin = false
...
}
...
}