Skip to content
This repository has been archived by the owner on Nov 11, 2018. It is now read-only.

Commit

Permalink
Initial commit
Browse files Browse the repository at this point in the history
  • Loading branch information
p-e-w committed Jan 24, 2016
0 parents commit abe496a
Show file tree
Hide file tree
Showing 8 changed files with 699 additions and 0 deletions.
34 changes: 34 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
# Based on .gitignore from https://github.com/pypa/sampleproject

# Backup files
*.~

# Byte-compiled / optimized / DLL files
__pycache__/
*.py[cod]

# C extensions
*.so

# Distribution / packaging
bin/
build/
develop-eggs/
dist/
eggs/
lib/
lib64/
parts/
sdist/
var/
*.egg-info/
.installed.cfg
*.egg
MANIFEST

# Installer logs
pip-log.txt
pip-delete-this-directory.txt

# Translations
*.mo
61 changes: 61 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,61 @@
[![PyPI](https://img.shields.io/pypi/v/maybe.svg)](https://pypi.python.org/pypi/maybe) ![Python versions](https://img.shields.io/pypi/pyversions/maybe.svg)

---


```
rm -rf pic*
```

Are you sure? Are you *one hundred percent* sure?


# `maybe`...

... allows you to run a command and see what it does to your files *without actually doing it!* After reviewing the operations listed, you can then decide whether you really want these things to happen or not.

![Screenshot](screenshot.png)


## What is this sorcery?!?

This comment has been minimized.

Copy link
@NotificationsBillingSSH

`maybe` runs processes under the control of [ptrace](https://en.wikipedia.org/wiki/Ptrace) (with the help of the excellent [python-ptrace](https://bitbucket.org/haypo/python-ptrace/) library). When it intercepts a system call that is about to make changes to the file system, it logs that call, and then modifies CPU registers to both redirect the call to an invalid syscall ID (effectively turning it into a no-op) and set the return value of that no-op call to one indicating success of the original call.

As a result, the process believes that everything it is trying to do is actually happening, when in reality nothing is.

That being said, `maybe` **should :warning: NEVER :warning: be used to run untrusted code** on a system you care about! A process running under `maybe` can still do serious damage to your system because only a handful of syscalls are blocked. Currently, `maybe` is best thought of as an (alpha-quality) "what exactly will this command I typed myself do?" tool.


## Installation

`maybe` requires [Python](https://www.python.org/) 2.7+ :snake:. It has been tested on Linux :penguin:, but should work on most Unixes, possibly including OS X. If you have the [pip](https://pip.pypa.io) package manager, all you need to do is run

```
pip install maybe
```

either as a superuser or from a [virtualenv](https://virtualenv.pypa.io) environment.


## Usage

### Command line

```
maybe COMMAND [ARGUMENT]...
```

No other command line parameters are currently accepted.

### Example

```
maybe mkdir test
```


## License

Copyright &copy; 2016 Philipp Emanuel Weidmann (<pew@worldwidemann.com>)

Released under the terms of the [GNU General Public License, version 3](https://gnu.org/licenses/gpl.html)
Empty file added maybe/__init__.py
Empty file.
164 changes: 164 additions & 0 deletions maybe/maybe.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,164 @@
#!/usr/bin/env python

# maybe - see what a program does before deciding whether you really want it to happen
#
# Copyright (c) 2016 Philipp Emanuel Weidmann <pew@worldwidemann.com>
#
# Nemo vir est qui mundum non reddat meliorem.
#
# Released under the terms of the GNU General Public License, version 3
# (https://gnu.org/licenses/gpl.html)


from sys import argv, exit
from subprocess import call

from ptrace.tools import locateProgram
from ptrace.debugger import ProcessSignal, NewProcessEvent, ProcessExecution, ProcessExit
from ptrace.debugger.child import createChild
from ptrace.debugger.debugger import PtraceDebugger
from ptrace.func_call import FunctionCallOptions
from ptrace.syscall import SYSCALL_PROTOTYPES, FILENAME_ARGUMENTS
from ptrace.syscall.posix_constants import SYSCALL_ARG_DICT
from ptrace.syscall.syscall_argument import ARGUMENT_CALLBACK

from syscall_filters import SYSCALL_FILTERS
from utilities import T, SYSCALL_REGISTER, RETURN_VALUE_REGISTER


# Register filtered syscalls with python-ptrace so they are parsed correctly
SYSCALL_PROTOTYPES.clear()
FILENAME_ARGUMENTS.clear()
for syscall_filter in SYSCALL_FILTERS:
SYSCALL_PROTOTYPES[syscall_filter.name] = syscall_filter.signature
for argument in syscall_filter.signature[1]:
if argument[0] == "const char *":
FILENAME_ARGUMENTS.add(argument[1])

# Turn list into dictionary indexed by syscall name for fast filter retrieval
SYSCALL_FILTERS = {syscall_filter.name: syscall_filter for syscall_filter in SYSCALL_FILTERS}

# Prevent python-ptrace from decoding arguments to keep raw numerical values
SYSCALL_ARG_DICT.clear()
ARGUMENT_CALLBACK.clear()


def prepareProcess(process):
process.syscall()
process.syscall_state.ignore_callback = lambda syscall: syscall.name not in SYSCALL_FILTERS


def parse_argument(argument):
argument = argument.createText()
if argument.startswith("'"):
# Remove quotes from string argument
return argument[1:-1]
else:
# Note that "int" with base 0 infers the base from the prefix
return int(argument, 0)


format_options = FunctionCallOptions(
replace_socketcall=False,
string_max_length=4096,
)


def get_operations(debugger):
operations = []

while True:
if not debugger:
# All processes have exited
break

# This logic is mostly based on python-ptrace's "strace" example
try:
syscall_event = debugger.waitSyscall()
except ProcessSignal as event:
event.process.syscall(event.signum)
continue
except NewProcessEvent as event:
prepareProcess(event.process)
event.process.parent.syscall()
continue
except ProcessExecution as event:
event.process.syscall()
continue
except ProcessExit as event:
continue

process = syscall_event.process
syscall_state = process.syscall_state

syscall = syscall_state.event(format_options)

if syscall and syscall_state.next_event == "exit":
# Syscall is about to be executed (just switched from "enter" to "exit")
syscall_filter = SYSCALL_FILTERS[syscall.name]

arguments = [parse_argument(argument) for argument in syscall.arguments]

operation = syscall_filter.format(arguments)
if operation is not None:
operations.append(operation)

return_value = syscall_filter.substitute(arguments)
if return_value is not None:
# Set invalid syscall number to prevent call execution
process.setreg(SYSCALL_REGISTER, -1)
# Substitute return value to make syscall appear to have succeeded
process.setreg(RETURN_VALUE_REGISTER, return_value)

process.syscall()

return operations


def main():
if len(argv) < 2:
print(T.red("Error: No command given."))
print("Usage: %s COMMAND [ARGUMENT]..." % argv[0])
exit(1)

# This is basically "shlex.join"
command = " ".join([(("'%s'" % arg) if (" " in arg) else arg) for arg in argv[1:]])

arguments = argv[1:]
arguments[0] = locateProgram(arguments[0])

try:
pid = createChild(arguments, False)
except Exception as error:
print(T.red("Error executing %s: %s." % (T.bold(command) + T.red, error)))
exit(1)

debugger = PtraceDebugger()
debugger.traceFork()
debugger.traceExec()

process = debugger.addProcess(pid, True)
prepareProcess(process)

operations = get_operations(debugger)

debugger.quit()

if operations:
print("%s has prevented %s from performing %d file system operations:\n" %
(T.bold("maybe"), T.bold(command), len(operations)))
for operation in operations:
print(" " + operation)
try:
choice = raw_input("\nDo you want to rerun %s and permit these operations? [y/N] " % T.bold(command))
except KeyboardInterrupt:
choice = ""
if choice.lower() == "y":
call(argv[1:])
else:
print("%s has not detected any file system operations from %s." %
(T.bold("maybe"), T.bold(command)))


if __name__ == "__main__":
main()
Loading

0 comments on commit abe496a

Please sign in to comment.