Running arbitrary commands directly on the node is already possible in several 
places in the `Jenkinsfile`:
* https://github.com/apache/tvm/blob/main/Jenkinsfile#L97
* https://github.com/apache/tvm/blob/main/Jenkinsfile#L127
* https://github.com/apache/tvm/blob/main/Jenkinsfile#L167

So our security is relatively poor even today. We can mitigate risks by:
* ensuring every step is wrapped in a reasonable timeout
* getting rid of persistent nodes (workers) and using autoscaled nodes only
* require approval to run for first time contributors 
(https://github.blog/2021-04-22-github-actions-update-helping-maintainers-combat-bad-actors/),
 though Jenkins may not easily support this
* make sure scripts run outside of docker are checked out from the target 
branch and not the PR branch for forked PRs (similar to how we manage the 
`Jenkinsfile` now). This would be troublesome for CI development for 
non-committers (i.e. me) but should lock down most of the vulnerability 
surface. We could take this further and only rebuild docker images on branches, 
which would still make testing / updating easier without the risks.





---
[Visit 
Topic](https://discuss.tvm.apache.org/t/rfc-rebuild-docker-images-per-commit/12047/4)
 to respond.

You are receiving this because you enabled mailing list mode.

To unsubscribe from these emails, [click 
here](https://discuss.tvm.apache.org/email/unsubscribe/3acd77aecd51fc0fcc7ad48358cad187d2dc6ef899efc8eb33790e7b5d3fb4f0).

Reply via email to