Investigate the impact of malicious uploaded files
<!--IssueSummary start-->
<details>
<summary>
Everyone can contribute. [Help move this issue forward](https://handbook.gitlab.com/handbook/marketing/developer-relations/contributor-success/community-contributors-workflows/#contributor-links) while earning points, leveling up and collecting rewards.
</summary>
- [Close this issue](https://contributors.gitlab.com/manage-issue?action=close&projectId=278964&issueIid=350815)
</details>
<!--IssueSummary end-->
See https://gitlab.com/gitlab-org/manage/import/backend/discussion/-/issues/9 for context.
When we accept/process user-provided files during import / export, ensure that malicious files can not cause negative impacts. Similar to gitlab-com/gl-infra/production#6132. One example is Decompression Bombs.
# Proposal
- Identify where we accept files from users
- Identify where we process already-uploaded files from users (e.g. when preparing an export and an MR has an attached file, or processing an archive that someone says is an import)
- Identify if any existing measures which prevent malicious files from impacting the system (e.g. anti-virus, sandboxing)
- Start a discussion on if and how we can improve our file handling protections against malicious files
N.b. this issue itself currently is a data gathering & conversation starting exercise, vs. having code-changing outcomes.
# References
- https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/10-Business_Logic_Testing/09-Test_Upload_of_Malicious_Files
+ In particular, the [section on Zip Bombs](https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/10-Business_Logic_Testing/09-Test_Upload_of_Malicious_Files#zip-bombs)
issue