Get the latest tech news
Landrun: Sandbox any Linux process using Landlock, no root or containers
Run any Linux process in a secure, unprivileged sandbox using Landlock LSM. Think firejail, but lightweight, user-friendly, and baked into the kernel. - Zouuup/landrun
You must explicitly add the path to the command you want to run with the--ro flag For system commands, you typically need to include/usr/bin,/usr/lib, and other system directories When using--exec, you still need to specify the directories containing executables with--ro Network restrictions require Linux kernel 6.8 or later with Landlock ABI v5 The--best-effort flag allows graceful degradation on older kernels that don't support all requested restrictions FeatureMinimum Kernel VersionLandlock ABI VersionBasic filesystem sandboxing5.131File referring/reparenting control5.172File truncation control6.13Network TCP restrictions6.85If you receive "permission denied" or similar errors: Ensure you've added all necessary paths with--ro or--rw Try running with--log-level debug to see detailed permission information Check that Landlock is supported and enabled on your system:
Or read this on Hacker News