Please describe exact testcases of the attacks you defend against. (You can describe them in replies to this email, instead of resending everything)
The code is going to be evolving in the future. The future core readers need to understand what needs to be avoided, On Sat, Jan 31, 2026 at 3:06 PM Sertonix via busybox <[email protected]> wrote: > > > Also results in a binary size shrink by sharing more code :) > > Without this a process having write access to a directory could trick > a more privilidged rm -r call to delete any file that the rm process > has access to. > _______________________________________________ > busybox mailing list > [email protected] > https://lists.busybox.net/mailman/listinfo/busybox _______________________________________________ busybox mailing list [email protected] https://lists.busybox.net/mailman/listinfo/busybox
