(no title)
arbll
|
3 months ago
It's fine for this project since google is probably not in the business of triggering exploits in yt-dlp users but please do not use deno sandboxing as a your main security measure to execute untrusted code. Runtime-level sandboxing is always very weak. Relying on OS-level sandboxing or VMs (firecracker & co) is the right way for this.
baobabKoodaa|3 months ago
yt-dlp supports a huge list of websites other than youtube
ethmarks|3 months ago
From the September announcement:
> The JavaScript runtime requirement will only apply to downloading from YouTube. yt-dlp can still be used without it on the other ~thousand sites it supports
arbll|3 months ago
blackhaj7|3 months ago
pwdisswordfishy|3 months ago
I mean, this gives me pause:
> Both QuickJS and QuickJS-NG do not fully allow executing files from stdin, so yt-dlp will create temporary files for each EJS script execution. This can theoretically lead to time-of-check to time-of-use (TOCTOU) vulnerabilities.
https://github.com/yt-dlp/yt-dlp/wiki/EJS
TOCTOU from temporary files is a solved problem.
jrochkind1|3 months ago
zahlman|3 months ago
... Isn't the web browser's sandboxing runtime-level?
arbll|3 months ago
ethmarks|3 months ago
franga2000|3 months ago