<table><tr><td style="">meven added a comment.
</td><a style="text-decoration: none; padding: 4px 8px; margin: 0 8px 8px; float: right; color: #464C5C; font-weight: bold; border-radius: 3px; background-color: #F7F7F9; background-image: linear-gradient(to bottom,#fff,#f1f0f1); display: inline-block; border: 1px solid rgba(71,87,120,.2);" href="https://phabricator.kde.org/D29407">View Revision</a></tr></table><br /><div><div><p>It has been reminded me that this solution to have some security rest entirely on the guarantees offered by $XDG_DATA_DIRS.<br />
Same can be said about X-KDE-Wayland-Interfaces.</p>
<p>But currently I believe this does not constitutes a strong security model.<br />
A malicious executable could manufacture a fake $XDG_DATA_DIRS, add an application folder in it and a desktop file for its executable, trigger kbuildsyscoca5 and then use any of the restricted interfaces.<br />
We would need further to restrict path for which we would consider the desktop file, for instance, like only root owned path.</p></div></div><br /><div><strong>REPOSITORY</strong><div><div>R108 KWin</div></div></div><br /><div><strong>REVISION DETAIL</strong><div><a href="https://phabricator.kde.org/D29407">https://phabricator.kde.org/D29407</a></div></div><br /><div><strong>To: </strong>meven, KWin, apol, davidedmundson, bport<br /><strong>Cc: </strong>ngraham, kwin, Orage, cacarry, LeGast00n, The-Feren-OS-Dev, cblack, jraleigh, zachus, fbampaloukas, mkulinski, ragreen, jackyalcine, iodelay, crozbo, bwowk, ZrenBot, alexeymin, himcesjf, lesliezhai, ali-mohamed, hardening, romangg, jensreuterberg, abetts, sebas, apol, ahiemstra, mart<br /></div>