Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Google Open Sources Sandboxed API

Google on Monday announced that it has made available its Sandboxed API as open source in an effort to make it easier for software developers to create secure products.

Google on Monday announced that it has made available its Sandboxed API as open source in an effort to make it easier for software developers to create secure products.

It’s not uncommon for applications to be affected by memory corruption or other types of vulnerabilities that can be exploited for remote code execution and other purposes. Using a sandbox ensures that the code responsible for processing user input can only access the resources it needs to, which mitigates the impact of a flaw by containing the exploit to a restricted environment and preventing it from interacting with other software components.

Sandboxed API open sourceWhile sandboxing can be highly useful, Google says it’s often not easy to implement. That is why the internet giant has decided to open source its Sandboxed API, which should make it easier to sandbox C and C++ libraries. The company has also open sourced its core sandboxing project, Sandbox2, which can be used on its own to secure Linux processes.

“Sandboxed API makes it possible to create security policies for individual software libraries. This concept allows to create reusable and secure implementations of functionality residing within popular software libraries, yet is granular enough to protect the rest of used software infrastructure,” explained members of Google’s ISE Sandboxing team.

For the time being, the Sandboxed API only supports libraries written in C and only Linux. However, Google plans on adding support for more programming runtimes and more operating systems — Unix-like systems may be added sooner, but the company says porting it to Windows is more challenging.

The API’s developers also plan on adding new sandboxing technologies, including hardware virtualization, and extending the build system.

Google has also pointed out that anyone can make suggestions for improving the Sandboxed API, which is also covered by the company’s Patch Reward Program.

The Sandboxed API and Sandbox2 source code is available on GitHub, along with usage instructions.

Related: Chrome OS Network Manager Sandboxed, Stripped of Root Privileges

Related: Google Launches “Asylo” Framework for Confidential Computing

Related: Google Introduces Open Source Cross-Platform Crypto Library

Related: Google Open Sources Fuzzing Platform

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

A new report finds that barely 1% of all SBOMs being generated today meets the “minimum elements” defined by the U.S. government.

Application Security

A security vulnerability identified on AliExpress, the wholesale marketplace owned by the Chinese e-commerce giant Alibaba, could have been exploited by hackers to hijack...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...