Remix.run Logo
arbll 17 hours ago

It's fine for this project since google is probably not in the business of triggering exploits in yt-dlp users but please do not use deno sandboxing as a your main security measure to execute untrusted code. Runtime-level sandboxing is always very weak. Relying on OS-level sandboxing or VMs (firecracker & co) is the right way for this.

baobabKoodaa 13 hours ago | parent | next [-]

> It's fine for this project since google is probably not in the business of triggering exploits in yt-dlp

yt-dlp supports a huge list of websites other than youtube

arbll 8 hours ago | parent | next [-]

I assumed they only use this setup for youtube, that might be wrong

blackhaj7 11 hours ago | parent | prev [-]

Is there a full list? I struggled to find one

dcassett 9 hours ago | parent | next [-]

https://github.com/yt-dlp/yt-dlp/blob/2025.09.23/supportedsi...

NoahZuniga 9 hours ago | parent | prev [-]

There's a supportedsites.md file in the base directory of the git repo.

jrochkind1 16 hours ago | parent | prev | next [-]

i wonder if it would be legal if they did, as an anti-circumvention counter-measure.

zahlman 9 hours ago | parent | prev [-]

> Runtime-level sandboxing is always very weak. Relying on OS-level sandboxing or VMs (firecracker & co) is the right way for this.

... Isn't the web browser's sandboxing runtime-level?

arbll 9 hours ago | parent | next [-]

It used to be 100% runtime-level and it was the golden age of browser exploits. Each of your tabs are now a separate process that the OS sandboxes. They can only access a specific API over IPC for anything that goes beyond js/rendering (cookie management, etc...). An exploit in V8 today only gives access to this API. A second exploit is needed in this API to escape the sandbox and do anything meaningful on the target system.

franga2000 9 hours ago | parent | prev [-]

Yes, and it's only reasonably secure because of years of exploits being found and fixed by some of the best (and very well-funded) software security engineers out there.

arbll 9 hours ago | parent | next [-]

That's not true. It's secure because they are stacking OS-sandboxing on top, forcing attackers to find a chain of exploits instead of a single issue in V8

NoahZuniga 9 hours ago | parent | prev [-]

Great news! Deno uses the same runtime as chrome, so you benefit from all those found exploits.

arbll 9 hours ago | parent [-]

While you benefit from the V8 fixes it lacks OS-level sandboxing (see above). Chrome is safe because it stacks security layers. Runtime sandboxing is just one of them and arguably the weakest one.