Bubblewrap: Unprivileged Sandboxing Tool for Linux

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
  1. bubblewrap

    Low-level unprivileged sandboxing tool used by Flatpak and similar projects

    Note that a sandbox escape is often possible via TIOCSTI (CVE-2017-5226) [0] unless a special flag (--new-session) is used.

    Bubblewrap is aware of this, yet their documentation gives no indication that this flag is necessary to produce a secure sandbox. In --help, the documentation of --new-session is simply "Create a new terminal session," which severely understates its importance.

    It's frustrating to have such a useful tool be knowingly easy to misuse.

    [0]: https://github.com/containers/bubblewrap/issues/142

  2. CodeRabbit

    CodeRabbit: AI Code Reviews for Developers. Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.

    CodeRabbit logo
  3. crosvm

    The Chrome OS Virtual Machine Monitor - Mirror of https://chromium.googlesource.com/crosvm/crosvm/

    I've also been looking into shipping apps as VM images with a minimal kernel. Do you know if WHPX requires the user to have admin rights? On the host side, Windows and Mac ports of crosvm [1] could be useful. crosvm seems to have all the necessary virtio device types, but a greater focus on security than QEMU.

    [1]: https://google.github.io/crosvm/

  4. nsjail

    A lightweight process isolation tool that utilizes Linux namespaces, cgroups, rlimits and seccomp-bpf syscall filters, leveraging the Kafel BPF language for enhanced security.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Nsjail: A light-weight process isolation tool for Linux

    4 projects | news.ycombinator.com | 4 Feb 2025
  • Firejail: Light, featureful and zero-dependency security sandbox for Linux

    6 projects | news.ycombinator.com | 11 Jul 2023
  • Server-side sandboxing: Containers and seccomp

    3 projects | news.ycombinator.com | 24 Oct 2023
  • HardenedBSD Feature Comparison with OpenBSD, FreeBSD, NetBSD

    2 projects | news.ycombinator.com | 3 Nov 2024
  • Notes on Running Containers with Bubblewrap

    1 project | news.ycombinator.com | 28 Jun 2022