Enable sandbox by default for homebrew/core #713
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
brew tests
with your changes locally?Now that Homebrew/homebrew-core#342 is finished we can now enable the sandbox by default for all users using the homebrew/core tap. This whitelist system should give users of the most widely used tap better security without breaking other taps that are working without the sandbox. We can aim to get all the Homebrew/homebrew-* taps supported in here eventually and allow the community to submit PRs if they want their tap protected by the sandbox. Eventually we may turn this on for all taps (but not for a while).