Skip to content

Conversation

austinderek
Copy link

Before this change, the documentation of the syscall.LazyDLL states to use windows.LazyDLL for secure loading of system DLLs. However, the use of the windows.LazyDLL structure is only secure (not vulnerable to DLL preloading/injection attacks) if the user creates the object through the windows.NewLazySystemDLL function or if they use windows.NewLazyDLL with an absolute path.

Given all this, I think it is better to point to windows.NewLazySystemDLL function instead of the windows.LazyDLL structure in the syscall.LazyDLL documentation.


🔄 This is a mirror of upstream PR #74284

@austinderek austinderek force-pushed the master branch 6 times, most recently from 7a1679d to 121e5bb Compare August 4, 2025 19:04
Copy link

staging bot commented Aug 4, 2025

🔍 This pull request has been sent to HackerOne's PullRequest review team because our automation detected one or more changes with potential security impact or requires further evaluation. Experts are now being assigned to this review based on relevant expertise and will validate or dismiss any security findings accordingly and post their feedback as comments within this pull request.

⏱️ Latest scan covered changes up to commit 384b795 (latest)


Check the status or cancel this secure code review here.

@austinderek austinderek force-pushed the master branch 23 times, most recently from 121e5bb to 7a1679d Compare August 5, 2025 07:04
@austinderek austinderek force-pushed the master branch 30 times, most recently from 6a08e80 to 37c78b5 Compare August 31, 2025 22:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants