It would be great if Bubblewrap could integrate Landlock for path-based security restrictions inside the sandbox. Currently, Bubblewrap isolates processes using namespaces and mount points, but it lacks a mechanism to enforce more granular file access controls. Using Landlock, we can control access to specific paths (files/directories) within the sandbox for defense in-depth. Chromium's Sandbox2 now also uses landlock. Integrate Landlock after Bubblewrap sets up the sandbox environment (namespaces, mounts) and add a new CLI flag like --landlock-allow READ:/path/to/dir to specify access rules for files or directories.
It would be great if Bubblewrap could integrate Landlock for path-based security restrictions inside the sandbox. Currently, Bubblewrap isolates processes using namespaces and mount points, but it lacks a mechanism to enforce more granular file access controls. Using Landlock, we can control access to specific paths (files/directories) within the sandbox for defense in-depth. Chromium's Sandbox2 now also uses landlock. Integrate Landlock after Bubblewrap sets up the sandbox environment (namespaces, mounts) and add a new CLI flag like
--landlock-allow READ:/path/to/dirto specify access rules for files or directories.