Skip to main content
  1. Docs/
  2. Managing Applications/

Application Security

Clace applications run in a sandbox environment with no direct access to the system or Clace service. All access is through plugins. When an application is installed, the admin can audit the application for what access is being requested. Only the permissions which are approved are allowed at runtime.

Security Model #

The security model used by Clace is:

  • The application code written in Starlark(python) and HTML templates is untrusted.
  • The Clace service and plugin code (in Go) are trusted.
  • The admin can audit and approve the access required by the untrusted application code when the app is being installed.
  • After installation, further application code updates do not require any further audit, as long as no new permissions are required. If the updated app code requires any new permission, the new plugin call will fail at runtime with a permission error.

The trust boundary is about what the application can do in the backend. The frontend code is sandboxed by the browser, there is no additional auditing implemented for the frontend code.

Usecases #

This security model allows for the following:

  • Users can download applications and run on their machine, without worrying about what operations the app can do on their system outside the audited permissions.
  • Operations teams can install and approve applications. Further application updates can be handled by the development team, without requiring the operational admins to verify the updated code. As long as the application works within the originally defined permission boundary, application updates will continue to work.
  • Application developers can use LLM powered automated code generation tools without worrying about the side-effects of the code. If the generated code tries to perform any operation not previously approved, it will fail.

Sample Application #

As an example, the disk usage analysis app requires two permissions

app ="Disk Usage",
              pages=["/", partial="du_table_block")],
                  ace.permission("", "run", ["du"]),
                  ace.permission("", "run", ["readlink"])

It requests permission to use the plugin to run two CLI commands, first being du and other being readlink. When installing the app

$ ./clace app create /utils/disk_usage ./examples/disk_usage/
App audit results /utils/disk_usage : app2WPQHwr5ZpKELqh0TvP5YMSnbab
  Plugins :
  Permissions: [du] [readlink]
App created. Permissions need to be approved

an audit report is shown with these requests. To approve the requested permissions, the admin can do

$ ./clace app approve /utils/disk_usage
App audit: /utils/disk_usage
  Plugins :
  Permissions: [du] [readlink]
App permissions have been approved.

The approval can be done during the app create itself, in that case the app is installed and approved immediately. None of the plugin code runs during the app creation, even for calls at the global scope. If the audit report does not match expectations, the app can be deleted.

$ ./clace app create --approve /utils/disk_usage ./examples/disk_usage/
App audit results /utils/disk_usage : app2WPQpws6C1mWb6BujYGOdWMnF1C
  Plugins :
  Permissions: [du] [readlink]
App created. Permissions have been approved

$ ./clace app delete /utils/disk_usage
App deleted /utils/disk_usage

Once the app is created, if the application code is updated to change the line from

    ret ="readlink", ["-f", current], process_partial=True)


    ret ="rm", ["-f", current], process_partial=True)

The app will fail at runtime with an error like

app /utils/disk_usage is not permitted to call with argument 0 having value "rm", expected "readlink". Update the app or audit and approve permissions

The app cannot be run until either the code change is reverted or the admin approves the new call to rm.

Roadmap #

The following enhancements are planned for the security model

  • Secrets management is planned, in such a manner that the application can request access to specific secrets. The application can use the secret but will not have direct access to the secret value, it will work with a reference to the secret key.