1May
What are the security related challenges in implementing something like Unix sudo?
There exist several sudo alternatives (systemd's run0
, OpenBSD and doas
, etc.), all created after sudo has been an established tool, allegedly for security reasons.
If someone were to implement Unix sudo from scratch today, what would be the security pitfalls to be careful about? I expect answers to be something around SETUID, external command execution, etc.