-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature request] Add sandboxing options and apparmor profile #43
Comments
I have already done it in my fork fireneat/Noisy here also I think it would be better to have seccomp profile because you can use ioctl which I don't think apparmor has. And if you want to sandbox Noisy then I think you would need to sandbox Python3 completly, anyways here is the profile if you're still interested:
|
Thank you very much. I understand that this version is no longer in development? |
@fireneat,You do realize that you are restricting all python and all scripts written in it, right? |
@Zbergen-cli Yes, I've also mentioned it, therefore I think it's only use case would be in Docker |
Hi!
The systemd services can now use sandboxing options, which has a positive effect on security. I would like noisy to use these settings as well. Also, additionally consider creating an apparmor profile.
Thanks for noisy!
The text was updated successfully, but these errors were encountered: