Local sandbox runner for copy.golf submissions. Runs a candidate binary or python script inside the same QEMU verifier the platform uses, so you can test before submitting — no HTTP, no queue.
- Linux, x86_64
qemu-system-x86_64,qemu-img(apt install qemu-system-x86 qemu-utils)ssh-keygen,sshuv/dev/kvmfor fast resets (~10 s); falls back to TCG (~80 s) without it
git clone https://github.com/renato-osec/copy-fail-tiny-elf-CVE-2026-31431.git
cd copy-fail-tiny-elf-CVE-2026-31431
uv sync --frozen --no-dev
# run any artifact through the sandbox VM (kind auto-detected from extension)
uv run python -m golf_platform.cli ./your-elf
uv run python -m golf_platform.cli ./your-script.py
# explicit kind / different port (if a server is already running on 2299)
uv run python -m golf_platform.cli ./your-elf --kind binary \
--ssh-port 2399 --state-dir /tmp/cli-vmFirst run downloads the Ubuntu 24.04 minimal cloud image (~260 MiB) into the state dir, builds a cloud-init seed, and boots the VM. Subsequent runs reuse it.
- Plants a root-only file containing a random 128-bit nonce.
- Runs your artifact as
nobodyunderprlimit(cpu=30, nproc=64). - Pipes
id -u+cat <flag>into your candidate's stdin. - Pass = candidate's stdout contains both
0and the nonce — i.e. an actual privesc to root inside the guest.
Same code path as the public platform; what passes here passes there.
made by @Renny