-
Notifications
You must be signed in to change notification settings - Fork 17
Description
There's a great body of work on object capability languages as a way of managing the risk of running untrusted code modules by only exposing limited fine-grained capabilities to the untrusted code.
But, while the subject is untrusted code, the environment itself in which the code runs, called a "Vat", must be considered trusted.
This is problematic when using cross-vat distributed code, because one malicious vat can steal the "Swiss number" references (random unguessable strings, effectively symmetric keys).
This makes it hard to reconcile object capability languages with smart contracts. In smart contracts we go out of our way to run consensus protocols so that a trusted environment can be built on untrusted nodes, but we can't assume privacy and so we can't use Swiss number references.
So now, by instantiating the vat with Dstack, we might be able to close this gap and draw some more insights or better composition / better hardening as a result.
As a starting point, we might simply run existing ocap sandbox in Dstack, possibly adding a new shim for referencing objects in different Dstack instances as different vats
https://github.com/endojs/endo
A more thoughtful example probably needs to illustrate some pattern of passing serialized/hardened code, containing Swiss numbers or even private keys, between such sandboxes. Needs more thought though
chatgpt discussion:
https://chatgpt.com/share/67ff0b25-b580-8009-a13b-d5ca70cb5fb7
