exodrifter logo
Home

❯

notes

❯

Arbitrary Code Execution in Godot serialization

Oct 28, 20241 min read

  • godot

Arbitrary Code Execution in Godot serialization

Many Godot functions allow for arbitrary code execution when a file is deserialized due to the fact that Godot always runs scripts in deserialized resources. To avoid this vulnerability, you can use get_var and store_var from FileAccess. 1

History

Footnotes

  1. 20240620003315 ↩


Table of Contents

  • Arbitrary Code Execution in Godot serialization
  • History

Backlinks

  • `JSON` does not round trip
  • Godot always runs scripts in deserialized resources

Created with Quartz v4.4.0 © 2025

  • GitHub
  • Discord