You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As much as I understand chiadog, it should only require read access to INFO-level debug.log and Internet connectivity.
Therefore, in order to encapsulate chiadog from doing any (thankfully / hopefully theoretical) malicious activity, shouldn't it already be enough to run chiadog as a Unix user with limited permissions, e.g. chiadog and setting up debug.log's Unix file permissions with a e.g. group chialog, which User chiadog is a member of?
The text was updated successfully, but these errors were encountered:
I believe you're right and this would indeed be a simpler solution. At least I'm not aware of any way that a malicious script could circumvent the limitations based on user permissions.
Would you be interested in contributing a step-by-step guide to the README for users less familiar with the unix user permission system?
I agree it's valuable to add instructions on using unix file permissions to sandbox Chiadog without Docker. But IMO it's more common to run services like these in Docker anyway these days, and the pattern for starting a docker container is more familiar to many. Especially to people that aren't Python devs.
As much as I understand chiadog, it should only require read access to INFO-level
debug.log
and Internet connectivity.Therefore, in order to encapsulate chiadog from doing any (thankfully / hopefully theoretical) malicious activity, shouldn't it already be enough to run chiadog as a Unix user with limited permissions, e.g.
chiadog
and setting updebug.log
's Unix file permissions with a e.g. groupchialog
, which Userchiadog
is a member of?The text was updated successfully, but these errors were encountered: