What stops a user from simply running the binary (ex: /bin/firefox) to go around the sandboxed application? #6467
Unanswered
allisonok331
asked this question in
Q&A
Replies: 1 comment 4 replies
-
By default, nothing.
SELinux, ...
The user is trusted! If you do not trust the user, you need to sandbox the session. Outline your thread model, then I can answer in more detail. |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
What stops a user from simply running the binary (ex: /bin/firefox) to go around the sandboxed application? Is there a way to ensure that the user cannot run the binary file and can only run the sandboxed version of the applicaiton? What is the point of sandboxing the application with firejail if the user can just find where the binary lives and run that. Please let me know if there is a way to avoid this or a known method to overcome this issue.
Beta Was this translation helpful? Give feedback.
All reactions