Ideas for mitigating malicious concmd use #2753
Fasteroid
started this conversation in
Suggestions
Replies: 2 comments
-
This would be solved simply with a convar to disallow people uploading code to your chips |
Beta Was this translation helpful? Give feedback.
0 replies
-
1 is the most logical option |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Consider having
concmd
execute on the chip uploader and not the prop protection owner.concmd
calls should prompt a message box displaying the command before executing, with options on how to handle it, such as...@strict
, halts the chip, otherwise ignores future concmd calls)To mitigate the annoyingness of 2, add a special directive called
@trust
, which accepts a steamid.@trust
is immutable upon spawning the chip (similar to@model
), and upon any attempt to change it via reupload will block all concmd for the chip. This prevents privilege escalation even if the concmd target remains the PP owner upon reupload.Upvote if you want these changes made!
Beta Was this translation helpful? Give feedback.
All reactions