Sandbox Dangerous-Path Bypass (rm/rmdir)
- Entity ID:
ent-20260423-r31a000000030 - Type:
concept - Scope:
private - Status:
active
Description
Security bug patched in v2.1.115/116: when sandbox auto-allow mode was active (the default in many team configurations), rm and rmdir invocations that targeted dangerous paths (/home, user's home directory, system paths) were auto-allowed without the dangerous-path check firing. Directly related to the long-standing rm -rf concerns in GitHub #6608 (August 2025). Fix ensures rm/rmdir targeting critical paths always trigger a permission prompt regardless of sandbox mode.
Key claims
- v2.1.115/116 patches sandbox rm/rmdir dangerous-path bypass
Relations
- Sandbox Dangerous-Path Bypass (rm/rmdir) --[patched_by]--> v2.1.115
- Sandbox Dangerous-Path Bypass (rm/rmdir) --[patched_by]--> v2.1.116