Skip to content Skip to sidebar Skip to footer

Are Web Workers A Secure Way To Sandbox Untrusted Javascript Code

I was wondering if a web worker would be a secure way to sandbox untrusted javascript code. Let's say for example in the context of a drawing application where developers can imple

Solution 1:

DOM is not available to the Web-workers, but it is possible to access same-origin stuff, like indexedDB. See my related question on this:

Can workers be secure enough for an untrusted code

The secure way is to use sandbox attribute of the iframe:

http://www.html5rocks.com/en/tutorials/security/sandboxed-iframes/

Also take a look at my library which simplifies the process and provides the convenient connection with the sandbox (function export instead of messaging):

https://github.com/asvd/jailed

Solution 2:

The problem with that is if the developers expect DOM access. Web Workers aren't allowed to handle DOM, unless the entire code is for data only.

I suggest you sandbox the entire app from the main domain, similar to how JSFiddle runs everything in iframes. That way, all potentially hazardous code can only work in that frame while all other things, like logins, are handled outside the frame, in the main domain away from the potentially dangerous code.

Best of all, just include safe code. Review the code before merging it in your main app.

Post a Comment for "Are Web Workers A Secure Way To Sandbox Untrusted Javascript Code"