mirror of
https://github.com/PaperCutSoftware/GhostTrap.git
synced 2025-12-11 08:43:42 -06:00
README Markdown format cleanup.
This commit is contained in:
parent
ff6b79b23d
commit
21e3650b97
@ -1,5 +1,4 @@
|
|||||||
Ghost Trap - Ghostscript trapped in a sandbox
|
# Ghost Trap - Ghostscript trapped in a sandbox
|
||||||
======
|
|
||||||
|
|
||||||
*Ghost Trap* is used to securely convert PostScript and PDF files from untrusted sources into images.
|
*Ghost Trap* is used to securely convert PostScript and PDF files from untrusted sources into images.
|
||||||
It's a modified distribution of the [GPL Ghostscript PDL interpreter](http://www.ghostscript.com/) secured and
|
It's a modified distribution of the [GPL Ghostscript PDL interpreter](http://www.ghostscript.com/) secured and
|
||||||
@ -19,6 +18,7 @@ securely holds Ghostscripts in a laser containment field :-)
|
|||||||
|
|
||||||
*Windows:* [ghost-trap-installer.exe](http://cdn.papercut.com/files/open-source/ghost-trap/ghost-trap-installer-1.2.9.10.exe) (version 1.2)
|
*Windows:* [ghost-trap-installer.exe](http://cdn.papercut.com/files/open-source/ghost-trap/ghost-trap-installer-1.2.9.10.exe) (version 1.2)
|
||||||
|
|
||||||
|
|
||||||
## Motivation
|
## Motivation
|
||||||
|
|
||||||
Page Description Language (PDL) interpreters are large complex native code solutions. Adobe Reader is also a PDL viewer and as evident
|
Page Description Language (PDL) interpreters are large complex native code solutions. Adobe Reader is also a PDL viewer and as evident
|
||||||
@ -69,7 +69,7 @@ as the standard Ghostscript console command as [documented](https://ghostscript.
|
|||||||
with the following known exceptions:
|
with the following known exceptions:
|
||||||
|
|
||||||
* The input and output files must be on a local disk (no network shares).
|
* The input and output files must be on a local disk (no network shares).
|
||||||
* The ```-dSAFER``` mode is always enabled by default.
|
* The `-dSAFER` mode is always enabled by default.
|
||||||
* Defining custom/extra FONT or LIB paths on the command line is not allowed.
|
* Defining custom/extra FONT or LIB paths on the command line is not allowed.
|
||||||
|
|
||||||
|
|
||||||
@ -91,6 +91,7 @@ The sandbox also constrains the execution process on an isolated desktop session
|
|||||||
[shatter attacks](http://en.wikipedia.org/wiki/Shatter_attack) and limits IPC and other potential
|
[shatter attacks](http://en.wikipedia.org/wiki/Shatter_attack) and limits IPC and other potential
|
||||||
escape vectors.
|
escape vectors.
|
||||||
|
|
||||||
|
|
||||||
## Release History
|
## Release History
|
||||||
|
|
||||||
### [1.3.9.27] - 2019-06-14
|
### [1.3.9.27] - 2019-06-14
|
||||||
@ -122,7 +123,7 @@ escape vectors.
|
|||||||
|
|
||||||
The following future refinements are planned:
|
The following future refinements are planned:
|
||||||
|
|
||||||
* Sandbox other executable in the GhostPDL project (e.g ```pcl6.exe```).
|
* Sandbox other executables in the GhostPDL project (e.g `pcl6.exe`).
|
||||||
* Support custom FONT and LIB paths defined on the command line (read only access).
|
* Support custom FONT and LIB paths defined on the command line (read only access).
|
||||||
* Look at sandbox options on Linux.
|
* Look at sandbox options on Linux.
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user