Skip to content

Commit

Permalink
Merge pull request #18 from Innoptech/jeanchristopheruel-patch-1
Browse files Browse the repository at this point in the history
Update README.md
  • Loading branch information
jeanchristopheruel authored Oct 30, 2024
2 parents 0032ca6 + d21be1f commit 588e61c
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -152,8 +152,8 @@ quad[:,1:4,:] *= scale # Avoid scaling normals
To read STL file with a large triangle count > **1 000 000**, the openstl buffer overflow safety must be unactivated with
`openstl.set_activate_overflow_safety(False)` after import. Deactivating overflow safety may expose the application
to a potential buffer overflow attack vector since the stl standard is not backed by a checksum.
This can cause significant risks if openstl is used as part of a service in a backend server for example. For
domestic usage, ignore this warning.
This can cause significant risks if openstl (and any other STL reader) is used as part of a service in a backend server for example. For
domestic usage, ignore this warning. OpenSTl is the only stl reader to provide such default safety feature.

# C++ Usage
### Read STL from file
Expand Down Expand Up @@ -263,4 +263,4 @@ The STL file format, while widely used for 3D modeling and printing, was designe

- Potential for Buffer Overflow Attacks: The lack of built-in validation and the absence of bounds checking in the STL format can make it susceptible to buffer overflow attacks. Care should be taken when handling STL files, especially those from untrusted sources, to ensure they are properly validated before being used.

These limitations are inherent to the STL format and should be considered when working with or implementing software that processes STL files. Developers are encouraged to implement additional validation and error-handling mechanisms in their applications to mitigate these risks.
These limitations are inherent to the STL format and should be considered when working with or implementing software that processes STL files. Developers are encouraged to implement additional validation and error-handling mechanisms in their applications to mitigate these risks.

0 comments on commit 588e61c

Please sign in to comment.