Replies: 1 comment
-
|
Thanks for the question, and sorry for the delay. I completely missed your question here 🤦♂️ Short answer: not the daemon itself, but sandboxing the spawned tools again could be a very good feature idea. The daemon needs access to credential stores like pass or gpg, macOS keychain, 1Password, etc. to fetch secrets. Fully sandboxing it would defeat its purpose. However, the tools it spawns, like Right now, spawned tools inherit the daemon user’s full filesystem view. There are two ways this could be addressed:
Something like: The daemon would prepend this to the command, so Each tool could have its own sandbox profile limiting filesystem access.
Run the daemon as a dedicated user, for example |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I'm thinking about how to limit what files a command can see.
Beta Was this translation helpful? Give feedback.
All reactions