The article presents Katakate's k7, a self-hosted infrastructure designed for creating lightweight virtual machine (VM) sandboxes to safely execute untrusted code. It supports a command-line interface, API, and Python SDK, leveraging technologies like Kubernetes, Kata, and Firecracker for efficient VM management. Currently in beta, it offers features for serverless applications, CI/CD runners, and blockchain execution, while being open-source under the Apache-2.0 license.
The article discusses a critical Remote Code Execution (RCE) vulnerability, named TARmageddon (CVE-2025-62518), found in the async-tar Rust library and its forks, including the abandoned tokio-tar. This vulnerability can lead to severe attacks due to its wide usage in popular projects, highlighting the challenges of maintaining open-source software and coordinating timely disclosures and patches across multiple forks. The Edera team recommends migrating to actively maintained forks to mitigate risks associated with the abandoned dependencies.