fix(io/local): resolve symlinks on sandbox root #10
No reviewers
Labels
No labels
athena
athena-gemini
audit
clotho
clotho-gemini
codex
darbs-claude
security
wiki
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: core/go#10
Loading…
Add table
Reference in a new issue
No description provided.
Delete branch "fix/macos-sandbox-symlink"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Summary
New()viafilepath.EvalSymlinksSECURITY sandbox escape detectedwarnings on macOS where/var→/private/varTestNewto compare against resolved pathsRoot Cause
New()stored the unresolved root (/var/folders/...) butvalidatePath()resolved child paths to/private/var/folders/.... Thefilepath.Rel()check then produced..prefixes, triggering false sandbox escape detections on every file operation.Test plan
go test ./pkg/io/local/passes on macOS (all 28 tests)TestValidatePath_Security)go test ./...🤖 Generated with Claude Code