Since eBPF was introduced into linux kernel, the eBPF verifier keeps the eBPF programs from any wrong-doing. I would like to look into the verifier and see if it's possible to extend the check to avoid reading any sensitive data in the memory.
Looking for hackers with the skills:
Nothing? Add some keywords!
This project is part of:
Hack Week 15
This project is one of its kind!