-
Notifications
You must be signed in to change notification settings - Fork 273
Open
Description
It would be great if Bubblewrap could integrate Landlock for path-based security restrictions inside the sandbox. Currently, Bubblewrap isolates processes using namespaces and mount points, but it lacks a mechanism to enforce more granular file access controls. Using Landlock, we can control access to specific paths (files/directories) within the sandbox for defense in-depth. Chromium's Sandbox2 now also uses landlock. Integrate Landlock after Bubblewrap sets up the sandbox environment (namespaces, mounts) and add a new CLI flag like --landlock-allow READ:/path/to/dir to specify access rules for files or directories.
Metadata
Metadata
Assignees
Labels
No labels