Skip to content

Conversation

@jeffhandley
Copy link
Member

@jeffhandley jeffhandley commented Jan 8, 2026

Augments Note that DeserializingResourceReader should not be used with untrusted data (dotnet/dotnet-api-docs#12198) with a central statement that resources are considered trusted.


Internal previews

📄 File 🔗 Preview link
docs/core/extensions/resources.md Resources in .NET apps

@jeffhandley jeffhandley self-assigned this Jan 8, 2026
@jeffhandley jeffhandley requested review from a team and gewarren as code owners January 8, 2026 01:06
Copilot AI review requested due to automatic review settings January 8, 2026 01:06
@dotnetrepoman dotnetrepoman bot added this to the January 2026 milestone Jan 8, 2026
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds a security-focused NOTE to the Resources in .NET apps documentation, clarifying that resource files (.resx and .resources) are considered trusted components of application deployment. This aligns with related work documenting security expectations for APIs that process resource files.

Key Changes:

  • Added a NOTE block explaining the trust model for resource files in .NET
  • Warns developers against processing untrusted resource files unless using explicitly safe APIs

Co-authored-by: Genevieve Warren <[email protected]>
@jeffhandley jeffhandley merged commit 712e5a5 into dotnet:main Jan 8, 2026
9 checks passed
@jeffhandley jeffhandley deleted the jeffhandley/resources-trusted branch January 8, 2026 21:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants