Skip to content

Commit

Permalink
README.md: Extend notes on threat model
Browse files Browse the repository at this point in the history
  • Loading branch information
hartwork committed Mar 4, 2023
1 parent b212379 commit 4b692f5
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -147,9 +147,13 @@ So what is shared with the application by default then?
a virtual machine rather than sandwine, e.g. because your username
is exposed to the running application and depending on your threat model,
that may be too much already.
Also sandwine has not seen any known external security audits, yet.
- sandwine is not intended for use with known-malicous software, viruses, malware.
- sandwine has not seen any known external security audits, yet.
- sandwine relies on [bubblewrap](https://github.com/containers/bubblewrap)
for its security, so it can only be as secure as bubblewrap.
- sandwine does not limit the set of syscalls that the application can do.
bubblewrap supports arguments `--seccomp` and `--add-seccomp-fd` to go further
on that end, but sandwine does not use them so far.
- sandwine does not keep the application from using loads of RAM, CPU time and/or disk space.
If your concerns include **denial of service**, you need protection beyond sandwine.
- sandwine relies on sane file permissions in the places that are shared read-only.
Expand Down

0 comments on commit 4b692f5

Please sign in to comment.