Skip to content

Fix pkg/container FuzzDockerExecSecurity failures leaking into the unit lane #99

@CodeMonkeyCybersecurity

Description

Summary

The unit lane is also failing in pkg/container because FuzzDockerExecSecurity seed cases are currently treated as hard test failures during normal go test execution.

Evidence

  • npm run ci:unit --silent later failed in pkg/container after the #291-#294 fixes were already green in their targeted packages.
  • Failing seeds included examples flagged as Null byte in exec parameters, Environment manipulation in arg 0: "PATH=/evil", and Path traversal in command: "../../bin/sh".
  • The package run also emitted a coverage export error after those failures.

Why this matters

  • It is a separate red build source unrelated to the issue-set fixes.
  • Security-focused fuzz tests should produce reproducible, intentional signals, not unexpectedly break the general unit lane.

Proposed work

  1. Decide whether these cases belong in the normal short/unit lane or only in a dedicated fuzz/security lane.
  2. Rework the fuzz oracle so malicious input is distinguished from an actual product regression.
  3. Add deterministic regression tests for the intended blocked cases and keep fuzzing focused on discovery.
  4. Ensure coverage generation remains stable when these tests run.

Acceptance criteria

  • npm run ci:unit --silent does not fail because of pkg/container fuzz seeds.
  • The security intent of the tests is preserved and documented.
  • Lane ownership between unit and fuzz runs is explicit.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions