Skip to content

sandboxing prevents access to /proc/ directory #169

@ghost

Description

The directory /proc/[pid]/ isn't available, which I think is a bit too harsh of a sandboxing measure in this case. I don't know of any use case where accessing /proc/[pid]/* could be abused. I understand not letting it mess with other processes, but you can restrict it to only its own process using symlinks or something similar, so that shouldn't be much of an issue.

Let me know if that idea sounds good! If it does I'll probably submit a PR within the next week or so to implement this idea.

Metadata

Metadata

Assignees

No one assigned

    Labels

    area: nsjailRelated to NsJail and its configurationtype: featureNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions