Hi Matt,
Ok good :-D
> Additionally you can execute user
> code on Compiler Explorer anyway, so pretty much all files are carefully
> sandboxed :)
Aha - indeed, well then just reading files is a mere drop compared to
what /could/ be done then. So I don't think there's any issue here.
> That said: I took a look at the info you linked - is there anything in
> particular you think is "leaky" ? The info you showed are all pretty
> much public information (it's well known we run on ec2 instances), and
> the rest is public or not (to me anyway) interesting. I don't think
> `/etc/passwd` has been useful for cracking/hacking since the 90s :D But
> I could be wrong...
/etc/passwd was just how I glanced to see what users were available on
the system. I'm no infosec, just a kernel developer, so I don't know all
the current vulnerabilities - but seeing lots of open information seemed
worrisome to me.
But if you're not worried - then I'm not :-D
--
Cheers
Kieran
--
Regards
--
Kieran