securitylab | Resources related to GitHub Security Lab | Security library
kandi X-RAY | securitylab Summary
kandi X-RAY | securitylab Summary
This is the main git repository of GitHub Security Lab. We use it for these main purposes:.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of securitylab
securitylab Key Features
securitylab Examples and Code Snippets
Community Discussions
Trending Discussions on securitylab
QUESTION
I'd like to enable users of my service to write and execute CodeQL queries. I don't want to offload their execution to GitHub's / Semmle's servers. It's unclear whether this is doable, or whether I'd run into licensing issues.
In the security lab, it says "CodeQL is free for research and open source". I do want for the queries––which users write––to be open source. I don't, however, want for their execution to done by an external service.
Any thoughts would be greatly appreciated. Thank you!
...ANSWER
Answered 2020-May-28 at 08:10The full CodeQL license terms are available here. The license states (emphasis added):
Further, except (and only to the extent) permitted by applicable law or applicable third-party license, you will not (and have no right to):
- ... share, publish, distribute or lend the Software, provide or make available the Software as a hosted solution (whether on a standalone basis or combined, incorporated or integrated with other software or services) for others to use, or transfer the Software or these Terms to any third party.
What you are considering is explicitly disallowed by the license.
If you'd like to explore options, I'd suggest reaching out to the GitHub Security Lab directly.
QUESTION
In an attempt to avoid stack clash attacks against a program, we tried to set a limit on the stack size with setrlimit(RLIMIT_STACK)
to about 2 MB.
This limit is fine for our program's own internal needs, but we then noticed that attempts to exec()
external programs began to fail on some systems with this new limit. One system we investigated using the test program below seems to have a minimum stack size for exec()
'd programs of a bit over 4 MiB.
My question is, how can we know the safe minimum value for the stack size on a given system, so that exec()
will not fail?
We don't want to just raise this until things stop failing on all the systems we currently test against, since that is likely to cause failures in the future as the program is ported to newer system types with higher minimum requirements.
The C test program below is written in terms of system()
, but the lower-level symptom is a failure in the execl()
syscall. Depending on the host OS you test on, you either get errno == E2BIG
or a segfault in the called program when you give the called program too little stack space to start up.
Build with:
...ANSWER
Answered 2017-Jul-01 at 05:02Your program was launched successfully, therefore your program was implicitly given the correct stack size for launching other programs in turn: during your program's startup, get the current limit before you set the new lower limit:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install securitylab
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page