fix: Enable stack canaries, heap poisoning, WDT panic; remove dead code
- CONFIG_COMPILER_STACK_CHECK_MODE_NORM=y (buffer overflow detection) - CONFIG_HEAP_POISONING_LIGHT=y (use-after-free/corruption detection) - CONFIG_ESP_TASK_WDT_PANIC=y (auto-reboot on hung task) - Remove unused #include "esp_now.h" (CVE-2025-52471 mitigation) - Replace hardcoded default IP 192.168.129.11 with 0.0.0.0 in Kconfig
This commit is contained in:
@@ -167,8 +167,11 @@ Note: Promiscuous mode (probe/deauth capture) disabled on original ESP32 — bre
|
||||
- [x] Serial console AUTH management
|
||||
- [x] Auto-generated auth secret on first boot
|
||||
- [x] Pentest completed: 50+ tests, all network-facing tests PASS
|
||||
- [ ] Enable stack canaries (`CONFIG_COMPILER_STACK_CHECK_MODE_NORM`)
|
||||
- [ ] Enable heap poisoning (`CONFIG_HEAP_POISONING_LIGHT`)
|
||||
- [x] Enable stack canaries (`CONFIG_COMPILER_STACK_CHECK_MODE_NORM`)
|
||||
- [x] Enable heap poisoning (`CONFIG_HEAP_POISONING_LIGHT`)
|
||||
- [x] Enable WDT panic (`CONFIG_ESP_TASK_WDT_PANIC`)
|
||||
- [x] Remove unused `#include "esp_now.h"` (CVE-2025-52471 mitigation)
|
||||
- [x] Remove hardcoded default IP from Kconfig (use TARGET command)
|
||||
- [ ] Multi-target (send data to 2+ UDP destinations)
|
||||
|
||||
## Web Backend (`~/git/esp32-web/`)
|
||||
|
||||
Reference in New Issue
Block a user