Background: I'm working on a framework/library to be used for a specific site in coordination with greasemonkey/userscripts. This framework/library will allow for addon support. The way it will work is an addon registers with the library listing required pages, resources, ectera and the library will wait until all critera is met to call the addon's load()
function.
The Issue:In this listing of 'required stuff' I want addon devs to be able to specify javascript(as string) to be evaluated as a 'required resource'. For example 'document.getElementById("banana")'
. What I want to do is semi-sandbox the evaluation of 'required resource' so the evaluation can access the window & DOM objects but is not able to directly alter them. I'd also like to make eval, and evalJS inaccessible from the sandbox.
Examples:
document.getElementById("banana")
-> validdocument.getElementById("apple).id = "orange"
-> invalidwindow.grape
-> validwindow.grape = 'potato'
-> invalid(someObj.applesCount > 0 ? 'some' : 'none')
-> valid
What I have so far:
function safeEval(input) {
// Remove eval and evalJS from the window:
var e = [window.eval, window.evalJS], a;
window.eval = function(){};
window.evalJS = function(){};
try {
/* More sanition needed before being passed to eval */
// Eval the input, stuffed into an annonomous function
// so the code to be evalued can not access the stored
// eval functions:
a = (e[0])("(function(){return "+input+"}())");
} catch(ex){}
// Return eval and evalJS to the window:
window.eval = e[0];
window.evalJS = e[1];
// Return the eval'd result
return a;
}
Notes:
This is a Greasemonkey/userscript. I do not have direct access to alter the site, or it's javascript.
The input for safeEval()
can be any valid javascript, be it a DOM query, or simple evaluations so long as it does not alter the window object or DOM.
There's no absolute way to prevent an end user or addon developer from executing specific code in JavaScript. That's why security measures in an open source language like JavaScript is said to be foolproof (as in it's only effective against fools).
That being said however let's build a sandbox security layer to prevent inexperienced developers from breaking your site. Personally I prefer using the
Function
constructor overeval
to execute user code for the following reasons:jQuery
).this
pointer and create local variables namedwindow
anddocument
to prevent access to the global scope and the DOM. This allows you to create your own version of the DOM and pass it to the user code.Note however that even this pattern has disadvantages. Most importantly it may only prevent direct access to the global scope. User code may still create global variables by simply declaring variables without
var
, and malicious code may use hacks like creating a function and using it'sthis
pointer to access the global scope (the default behavior of JavaScript).So let's look at some code: http://jsfiddle.net/C3Kw7/
I know this is an old post, but I just want to share an upgraded version of the Aadit M Shah solution, that seems to really sandbox without any way to access window (or window children): http://jsfiddle.net/C3Kw7/20/
If all you want is a simple getter, program one instead of trying to eval anything.
You can do something like this: http://jsfiddle.net/g68NP/
Problem is that you'll have to add a lot of code to protect every property, every native method, etc. The meat of the code really comes down to using
__defineGetter__
, whose support is limited. Since you're probably not running this on IE, you should be fine.EDIT: http://jsfiddle.net/g68NP/1/ This code will make all properties read-only. The use of
hasOwnProperty()
may or may not be desirable.In case JSFiddle goes down: