Security/ProcessIsolation/ThreatModel: Difference between revisions

Line 78: Line 78:


====Threats====
====Threats====
*Some examples here: http://dev.chromium.org/developers/design-documents/sandbox#TOC-The-Job-object
*Manipulate clipboard
*Manipulate deskop, display settings, etc
*Render or intercept native OS or other-app dialogs
 
More info here: http://dev.chromium.org/developers/design-documents/sandbox#TOC-The-Job-object


=Attack Vectors=
=Attack Vectors=
Confirmed users
717

edits