Skip to main content

Module validate

Module validate 

Source
Expand description

Input validation for sandbox execution.

Validates user input before sandbox execution to prevent:

  • Empty commands - Would cause exec to fail
  • Null bytes - Could cause string truncation attacks
  • Path traversal - ../ could escape workspace
  • Absolute paths - Could reference host filesystem

§Example

use evalbox_sandbox::validate::{validate_cmd, validate_path};

// Valid inputs
assert!(validate_cmd(&["echo", "hello"]).is_ok());
assert!(validate_path("main.py").is_ok());

// Invalid inputs
assert!(validate_cmd(&[]).is_err());           // Empty command
assert!(validate_path("../etc/passwd").is_err()); // Path traversal
assert!(validate_path("/etc/passwd").is_err());   // Absolute path

Enums§

ValidationError
Validation error for sandbox inputs.

Functions§

validate_cmd
Validate command and arguments.
validate_path
Validate a relative path (no .., no absolute).