Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security considerations #11

Open
zcorpan opened this issue Apr 5, 2022 · 1 comment
Open

Security considerations #11

zcorpan opened this issue Apr 5, 2022 · 1 comment
Labels
Q1 Internal classification of the proposed quarter to do the work

Comments

@zcorpan
Copy link
Member

zcorpan commented Apr 5, 2022

From the ARIA-AT automation meeting on March 14, 2022: #17 (minutes)

Allowing automation of screen readers is not without security concerns, as it can effectively allow universal XSS in the browser, or even allow any input in the OS and access to things that apps normally don't have access to (e.g. the login screen).

In CI, there are also security risks, but different to a local setup. Some CI systems today disable macOS SIP (System Integrity Protection), which makes it possible to programatically turn on VoiceOver.

Ideas:

  • Require some form of opt-in to enable automation
  • Don't allow HID-level input to be simulated
  • Use some kind of sandbox in automated mode to limit access
  • Use sessions

cc @cookiecrook @mcking65 @s3ththompson

@zcorpan
Copy link
Member Author

zcorpan commented Sep 26, 2022

Don't allow HID-level input to be simulated

This would allow privilege escalation since screen readers usually have more privilege than other apps (e.g. browsers).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Q1 Internal classification of the proposed quarter to do the work
Projects
None yet
Development

No branches or pull requests

2 participants