Security Risk Feature: Packaging C# and DLL's into FHIR Resources #606
baseTwo
announced in
Announcements
Replies: 2 comments 3 replies
-
As an alternative we could consider to code signatures on the DLL output. I would recommend to add that functionality in any case. Even if the FHIR server creates the DLL based on the CQL/ELM, we should protect the code against direct manipulation and be able to verify that the code is still the same code that was initially created. |
Beta Was this translation helpful? Give feedback.
0 replies
-
Unfortunately, we are currently using exactly this feature ... |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Intro
At the moment, the packager CLI has the ability to convert ELM to C# and .NET libraries. Furthermore the tool packages the C# and .NET DLLs into library and measure FHIR resources.
Uploading these to a FHIR Server to be executed is a major security concern as it leaves the server vulnerable to a range of trojans, malicious code or information theft.
Realistically only CQL and ELM should be included into a FHIR Resource. It is up to a FHIR Server to be able to compile these into its own native executable code.
Solution
The Packager CLI must be changed so the default behaviour is to only include CQL and ELM into FHIR Resources. It must still be possible to include C# and compiled .NET assemblies, but through a flag on the command line.
It's worth considering outputting what the risks are if this is selected, to the console and log file
Beta Was this translation helpful? Give feedback.
All reactions