GeistHaus
log in · sign up

The V8 Sandbox

v8.dev

V8 features a lightweight, in-process sandbox to limit the impact of memory corruption bugs

9 pages link to this URL
From object transition to RCE in the Chrome renderer

In this post, I'll exploit CVE-2024-5830, a type confusion in Chrome that allows remote code execution (RCE) in the renderer sandbox of Chrome by a single visit to a malicious site.

1 inbound link article en SecurityVulnerability research Chromeexploit developmentGitHub Security Labvulnerability research
Sandboxes? In my process? It's more likely than you think.

Discussions around memory safety often focus on choice of language, and how the language can provide memory safety guarantees. Unfortunately, choosing a language is a decision made at the start of a project. Migrating an existing C or C++ project to a safer language is much harder than starting a new project in a safe language1. I’m not going to say this is impossible, or that you can’t or shouldn’t migrate existing programs to safer languages. And sometimes people just do things in open-source, and that’s part of the fun of it.

0 inbound links article en blog CC BY-NC-SA 4.0
ExploitBench

How far up the exploitation ladder can an agent climb on a production JS engine? ExploitBench measures frontier LLMs on full-control V8 exploit synthesis with 16 capabilities measured per run and multi-round shuffled-layout grading.

0 inbound links website en exploit benchmarkV8 exploitationLLM securityAI security evaluationmemory corruptioncapability evaluationbrowser exploitationautomated exploit generation
Advancing Protection in Chrome on Android

Android recently announced Advanced Protection, which extends Google’s Advanced Protection Program to a device-level security setting for Android users that need heighte…

1 inbound link article en NoneChrome Security