Expand description
Input validation for sandbox execution.
Validates user input before sandbox execution to prevent:
- Empty commands - Would cause exec to fail
- Null bytes - Could cause string truncation attacks
- Path traversal -
../could escape workspace - Absolute paths - Could reference host filesystem
§Example
ⓘ
use evalbox_sandbox::validate::{validate_cmd, validate_path};
// Valid inputs
assert!(validate_cmd(&["echo", "hello"]).is_ok());
assert!(validate_path("main.py").is_ok());
// Invalid inputs
assert!(validate_cmd(&[]).is_err()); // Empty command
assert!(validate_path("../etc/passwd").is_err()); // Path traversal
assert!(validate_path("/etc/passwd").is_err()); // Absolute pathEnums§
- Validation
Error - Validation error for sandbox inputs.
Functions§
- validate_
cmd - Validate command and arguments.
- validate_
path - Validate a relative path (no
.., no absolute).