Re: Potential security risk associated with function call - Mailing list pgsql-hackers

From David G. Johnston
Subject Re: Potential security risk associated with function call
Date
Msg-id CAKFQuwZTDJLP1Wt821qk=ZEywkkRqpx+ou2EQKptAtwvFwLjmQ@mail.gmail.com
Whole thread
In response to Re: Potential security risk associated with function call  ("Jet" <zhangchenxi@halodbtech.com>)
List pgsql-hackers
On Tuesday, March 10, 2026, Jet <zhangchenxi@halodbtech.com> wrote:
> It is the explicit responsibility of
> the superuser to make sure the functions they create using untrusted
> languages are correct and execute safely when called by PostgreSQL.
But the question is how can a superuser know the "internal" and "c" functions
implementation details? He will not know whether the code has !PG_ARGISNULL(...),
and create a harmful function accidentally...

You describe the fundamental problem/risk of the entire software industry.  At least PostgreSQL has chosen a business model where the superuser has the option to read the source code.

David J.
 

pgsql-hackers by date:

Previous
From: Nazir Bilal Yavuz
Date:
Subject: Re: Speed up COPY FROM text/CSV parsing using SIMD
Next
From: Kirill Reshke
Date:
Subject: Re: Potential security risk associated with function call