Comment by arbll
9 hours ago
It's fine for this project since google is probably not in the business of triggering exploits in yt-dlp users but please do not use deno sandboxing as a your main security measure to execute untrusted code. Runtime-level sandboxing is always very weak. Relying on OS-level sandboxing or VMs (firecracker & co) is the right way for this.
> It's fine for this project since google is probably not in the business of triggering exploits in yt-dlp
yt-dlp supports a huge list of websites other than youtube
I assumed they only use this setup for youtube, that might be wrong
Is there a full list? I struggled to find one
https://github.com/yt-dlp/yt-dlp/blob/2025.09.23/supportedsi...
There's a supportedsites.md file in the base directory of the git repo.
i wonder if it would be legal if they did, as an anti-circumvention counter-measure.
> Runtime-level sandboxing is always very weak. Relying on OS-level sandboxing or VMs (firecracker & co) is the right way for this.
... Isn't the web browser's sandboxing runtime-level?
It used to be 100% runtime-level and it was the golden age of browser exploits. Each of your tabs are now a separate process that the OS sandboxes. They can only access a specific API over IPC for anything that goes beyond js/rendering (cookie management, etc...). An exploit in V8 today only gives access to this API. A second exploit is needed in this API to escape the sandbox and do anything meaningful on the target system.
Yes, and it's only reasonably secure because of years of exploits being found and fixed by some of the best (and very well-funded) software security engineers out there.
That's not true. It's secure because they are stacking OS-sandboxing on top, forcing attackers to find a chain of exploits instead of a single issue in V8
Great news! Deno uses the same runtime as chrome, so you benefit from all those found exploits.
1 reply →