Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use seccomp to disable setuid/setgid binaries in Linux sandbox #52

Open
Tracked by #29
zombiezen opened this issue Sep 25, 2024 · 1 comment
Open
Tracked by #29

Use seccomp to disable setuid/setgid binaries in Linux sandbox #52

zombiezen opened this issue Sep 25, 2024 · 1 comment
Labels
backend Build server enhancement New feature or request os-linux Issue that specifically impacts Linux experience

Comments

@zombiezen
Copy link
Collaborator

zombiezen commented Sep 25, 2024

Nix uses seccomp to prevent setuid/setgid bits from entering the build, among a few other things. This issue tracks emulating this behavior.

@zombiezen zombiezen added enhancement New feature or request backend Build server os-linux Issue that specifically impacts Linux experience labels Sep 25, 2024
@zombiezen zombiezen added this to the MVP milestone Oct 9, 2024
@zombiezen
Copy link
Collaborator Author

Sat down to try to implement this and found that Go doesn't have direct support for seccomp. There is a library, but it needs to be executed in the child process. This means a helper binary and a cgo dependency.

Punting beyond MVP, but I'll remove any setuid/setgid bits in the store at the least.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backend Build server enhancement New feature or request os-linux Issue that specifically impacts Linux experience
Projects
None yet
Development

No branches or pull requests

1 participant