You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We use custom parsers to parse Radius-related resource IDs and do not use any other custom parsers. Radius resource ids are a custom string format that can be parsed from untrusted data. The parser is a shared component.
We should use fuzzing to validate that Radius parser does not accept anything other than a valid Radius resource ID and make sure there are no bugs and vulnerabilities.
@nithyatsu can you add some acceptance criteria (for example, when does the fuzz testing run, or other questions that would help us understand. Are we trying to prevent DDOS or ensure correctness?)
If this is coming from the threat model, can you link to that part of the model so that we know the impact and motivation for doing this work, which will help us prioritize.
To help us investigate further, we need additional information to reproduce or understand this issue. Please ensure you have steps to reproduce and information about your OS, rad CLI version, and runtime version.
A project maintainer will reply on this issue soon to ask for additional specifics if needed.
For more information on our triage process please visit our triage overview
We use custom parsers to parse Radius-related resource IDs and do not use any other custom parsers. Radius resource ids are a custom string format that can be parsed from untrusted data. The parser is a shared component.
We should use fuzzing to validate that Radius parser does not accept anything other than a valid Radius resource ID and make sure there are no bugs and vulnerabilities.
AB#13777
The text was updated successfully, but these errors were encountered: