(no title)
ajsharp | 1 year ago
> The agent runs over port-forwarded SSH. It establishes a WebSockets connection back to your running VSCode front-end. The underlying protocol on that connection can:
- Wander around the filesystem - Edit arbitrary files - Launch its own shell PTY processes - Persist itself
When you ssh into a remote server as a client, afaik that server cannot execute arbitrary code on the client. At a minimum, the client would have to explicitly take action for that to happen.
KTibow|1 year ago
retsl|1 year ago
For Remote SSH: [...] A compromised remote could use the VS Code Remote connection to execute code on your local machine."
https://github.com/microsoft/vscode-remote-release/issues/66...
I wrote about it in a bit more detail a month ago because it seems to be a common misunderstanding: "VS Code Remote Dev and Dev Containers are not security boundaries" https://lets.re/blog/vscode-remote-dev/
Maxious|1 year ago
unknown|1 year ago
[deleted]
inetknght|1 year ago
...assuming you have X11 forwarding disabled and/or don't have X11 server running on the same system that your client is running on.
yjftsjthsd-h|1 year ago
awwaiid|1 year ago
khana|1 year ago
[deleted]