This repository was archived by the owner on Jan 3, 2023. It is now read-only.

Description
Some parts of the daemon are harmless and we don't have to require root permissions to access it -- for example the CVE scan. Some parts are more or less privilege escalation devices, users can get root rights by injecting content with bash remediations. These remediations can do anything root can do, including giving some particular users root rights. This is obviously something we have to avoid!
These are some ways to solve this:
- The tasks can optionally drop rights before evaluating
- technically this is very nice, users can evaluate using their own rights
- unfortunately this is not very useful, most content requires root rights to be usable
- We can split the interface, allow anyone within some group to do all the unprivileged safe stuff and only let root do the dangerous stuff
- what do we allow in the unprivileged interface besides cve scanning?
- We can require root for everything and then nothing is privilege escalation (this is what we do now)
- Combination of the above
Thoughts? I'd like to discuss this a little before committing to any direction.
@ybznek @baude @isimluk