-
Notifications
You must be signed in to change notification settings - Fork 3
Open
Labels
Securitygood first issueGood for newcomersGood for newcomerspolicyWriting CSL policies for business useWriting CSL policies for business use
Description
📝 Context
An internal data processing agent moves files between servers. We need to ensure it NEVER sends sensitive data to an IP address that isn't on our internal whitelist (e.g., starting with 10.0.).
🎯 The Goal
Write a .csl file that validates the destination IP address.
Variables you can use:
destination_ip(String): The IP address the agent is trying to send data to (e.g., "192.168.1.5").data_sensitivity(String): "HIGH", "MEDIUM", or "LOW".
Requirements:
- MUST BLOCK if
data_sensitivityis"HIGH"ANDdestination_ipdoes NOT start with"10.0.". - ALLOW if the data sensitivity is "LOW".
- ALLOW if the IP starts with "10.0.".
(Hint: You might need to use a STARTS_WITH or string matching function if supported in CSL, or simulate it with logic).
📚 Resources
- Start here:
docs/getting-started.md - String operations:
docs/syntax-spec.md
✅ Definition of Done
Submit a PR with a new file: examples/community/ip_whitelist_guard.csl
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
Securitygood first issueGood for newcomersGood for newcomerspolicyWriting CSL policies for business useWriting CSL policies for business use