diff --git a/docker/docker/Dockerfile b/docker/docker/Dockerfile index e1a4cf4..106dd73 100755 --- a/docker/docker/Dockerfile +++ b/docker/docker/Dockerfile @@ -39,11 +39,12 @@ RUN echo "Installing python with dtrace" && \ cd Python-${PYTHON_VERSION} && ./configure --with-dtrace --prefix=/usr/local/openssl --prefix=$(pwd) --with-ensurepip=install && make && make install RUN echo "Installing bpftrace" && \ - wget https://github.com/iovisor/bpftrace/releases/download/${BPFTRACE_VERSION}/bpftrace && \ - chmod +x bpftrace && \ - mv bpftrace /bin && \ - echo "Done building bpftrace" && \ - mv /kernel/usr/src/linux-headers* /kernel/usr/src/linux-headers + # wget https://github.com/iovisor/bpftrace/releases/download/${BPFTRACE_VERSION}/bpftrace && \ + # chmod +x bpftrace && \ + # mv bpftrace /bin && \ + # echo "Done building bpftrace" && \ + mv /kernel/usr/src/linux-headers* /kernel/usr/src/linux-headers && \ + apt-get install bpftrace -y; # Install nsjail: taken from https://github.com/google/nsjail/blob/master//Dockerfile= #RUN git clone https://github.com/google/nsjail.git /nsjail && cd /nsjail && make && mv /nsjail/nsjail /bin && rm -rf -- /nsjail diff --git a/pyproject.toml b/pyproject.toml index 02d0151..29dbf3c 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -1,7 +1,7 @@ [tool.poetry] name = "secimport" -version = "0.9.2" -description = "A sandbox/supervisor for python modules." +version = "0.10.0" +description = "A eBPF runtime sandbox for python that prevents RCE." authors = ["Avi Lumelsky"] license = "MIT" homepage = "https://github.com/avilum/secimport" diff --git a/secimport/backends/common/utils.py b/secimport/backends/common/utils.py index 058d78d..0eff7ca 100644 --- a/secimport/backends/common/utils.py +++ b/secimport/backends/common/utils.py @@ -58,9 +58,10 @@ def render_syscalls_filter( # Translating syscall _syscall_number = SYSCALLS_NAMES.get(_syscall) if _syscall_number is None: - raise NotImplementedError( + print("Warning:", NotImplementedError( f"The provided syscall it not a syscall mapped to a number: '{_syscall}'" - ) + )) + continue # dtrace if instrumentation_backend == InstrumentationBackend.DTRACE: