Skip to content

bellard_1776_quickjs.d7ae12a:task_cleanroom contains readable executable #14

@suche-ux

Description

@suche-ux

Hi, I noticed cheating behavior in this task

seems the task_cleanroom image contains readable executable under tmp dir.

can you take a look?

docker run -it --rm docker.io/programbench/bellard_1776_quickjs.d7ae12a:task_cleanroom
Emulate Docker CLI using podman. Create /etc/containers/nodocker to quiet msg.
root@f0608ae4de15:/workspace# ls /tmp -l
total 4808
-rw-r--r-- 1 1001 1001 4921336 Apr 21 20:32 _inject_exe

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions