Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

sandbox-exec -f curr_dir_access_profile.sb markdownlint




So you have to install npm package markdownlint on your machine and let it run it's potentially dangerous postinstall step?

You can customize curr_dir_access_profile.sb to block access to network/fs/etc. Why is this not enough?

Some tools do require Internet access.

Further, I don't even want to take the risk of running 'npm install markdownlint' anymore on my machine.


I understand the concern. However, you can customize the profile (e.g., allowlist) to only allow network access to required domains. Also, looks like your sandboxing solution is Docker based, which uses VMs on a Mac machine, but will not use VMs on a Linux machine (weak security).

That's why I wrote my own sandbox. Everyone hand waives these concerns.

Further, I don't know why docker is weak security on Linux. Are you telling me that one can exploit docker?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: