-
-
Notifications
You must be signed in to change notification settings - Fork 7.7k
Isolate (sandbox) language servers #12358
Copy link
Copy link
Open
Labels
area:extensions/infrastructureFeedback for extensions APIs, creation, management, etcFeedback for extensions APIs, creation, management, etcarea:languagesAn umbrella label for all programming languages syntax behaviorsAn umbrella label for all programming languages syntax behaviorsarea:networkNetwork connectivity issues, protocols and services supportNetwork connectivity issues, protocols and services supportarea:security & privacyData privacy issue, security vulnerabilities, etcData privacy issue, security vulnerabilities, etc
Description
Check for existing issues
- Completed
Describe the feature
Related to #12354. Language servers downloaded by Zed have full access to everything on the machine. This is problematic from a security perspective (e.g. as seen recently the github release could be tampered with, causing people to download and execute malicious code). To mitigate the possible impact from this, it would be useful to sandbox language servers somehow, e.g. restrict them to only access files that belong to the work tree (and the language's respective system/standard library modules).
If applicable, add mockups / screenshots to help present your vision of the feature
No response
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
area:extensions/infrastructureFeedback for extensions APIs, creation, management, etcFeedback for extensions APIs, creation, management, etcarea:languagesAn umbrella label for all programming languages syntax behaviorsAn umbrella label for all programming languages syntax behaviorsarea:networkNetwork connectivity issues, protocols and services supportNetwork connectivity issues, protocols and services supportarea:security & privacyData privacy issue, security vulnerabilities, etcData privacy issue, security vulnerabilities, etc