Skip to content

P2: hash_binary sandbox blocks C:\Windows\System32 — hash-integrity task always fails #163

@Shreyas582

Description

@Shreyas582

Description

The hash_binary tool's allowed_read_roots on Windows only includes C:\ProgramData and C:\Windows\System32\winevt\Logs. It does not include C:\Windows\System32 itself.

When the hash-integrity task tries to hash system binaries (e.g., C:\Windows\System32\cmd.exe), the path is blocked by the sandbox, producing a false-positive high-severity finding about the tool failing rather than actual integrity concerns.

Reproduction

wraithrun --dry-run --task hash-integrity
# Finding: "hash_binary path blocked by sandbox policy"

Expected Behavior

C:\Windows\System32 (read-only) should be in the allowed read roots for hash_binary, since hashing system binaries is the core purpose of this tool on Windows.

Affected Files

  • cyber_tools/src/lib.rs (allowed_read_roots configuration)

Metadata

Metadata

Assignees

No one assigned

    Labels

    area:toolsCyber tools, tool registry, and host introspectionbugSomething isn't workinglive-testing-auditFrom v1.6.0 live-mode comprehensive testingpriority:p2Normal-priority issuesecuritySecurity-related hardening or fixes

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions