Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Are you telling me I, a normal unprivileged user, have a way to read files on windows that bypasses audit logs?




I'm guessing they are making an implicit distinction between access as the user, vs with the privs of the user.

In the second case, the process has permission to do whatever it wants, it elects to restrain itself. Which is obviously subject to many more bugs then the first approach.


If there is a product defect? Sure.

The dude found the bug, reported the bug, they fixed the bug.

This isn’t uncommon, there bugs like this frequently in complex software.


I think you just defined away the entire category of vulnerability known as "privilege escalation".

This isn’t an example of escalation. Copilot is using the user’s token similar to any other OAuth app that needs to act on behalf of the user.

If that is true, then how did it not get logged? The audit should not be under the control of the program making the access.

You're conflating two issues. The Purview search used to get the bad result wasn't clear, so unsure what system is doing the logging.

If someone (Copilot, in this case) has built a search index that covers all the files on your computer, and left it accessible to your user account... yes



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: