generated from ossf/project-template
-
Notifications
You must be signed in to change notification settings - Fork 184
Open
Labels
Description
As talked about in today's meeting, it would be good to have guidelines to help developers sandbox their applications.
Landlock is the Linux sandboxing mechanism designed for such use case which requires an unprivileged access control system. It can be used through 3 dedicated syscalls to create and enforce a security policy on the calling task (e.g. the developer's application) and its future children.
We already have:
- a user documentation
- man pages
- several talks
- a full article
- a workshop
- a sandboxer example
- a Go library
- a Rust crate
- other libraries and tools such as setpriv, Minijail, or Firejail.
Who is interested in this topic?