Since eBPF was introduced into linux kernel, the eBPF verifier keeps the eBPF programs from any wrong-doing. I would like to look into the verifier and see if it's possible to extend the check to avoid reading any sensitive data in the memory.
Looking for mad skills in:
Nothing? Add some keywords!
This project is part of:
Hack Week 15
This project is one of its kind!