Replies: 1 comment
-
The good news is that Mac process sandboxing seems to be highly configurable and can be dynamically invoked for individual processes. Here's a shell tool built around it: https://github.com/lynaghk/sandboxtron The bad news is that the underlying macOS tool, |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
macOS does this automatically for some stuff, but not for anything OSS related.
eg. prohibiting reads of
~/.ssh
is an easy security win with few downsides. Tools that genuinely need access can request it in the package yaml and then tea can prompt to allow it on first run.Ideally I think we'd extend the macOS security feature (no idea what system controls this, you see it if you do a
find ~
for example). However I don’t think that's possible.Beta Was this translation helpful? Give feedback.
All reactions