* Island: Sandboxing tool powered by Landlock
@ 2025-12-05 11:22 Mickaël Salaün
[not found] ` <303DA753-37EF-4530-AA63-4C3579E9A454.1@smtp-inbound1.duck.com>
0 siblings, 1 reply; 2+ messages in thread
From: Mickaël Salaün @ 2025-12-05 11:22 UTC (permalink / raw)
To: landlock; +Cc: oss-security, linux-security-module, lwn
Hi,
I just released Island, a sandboxing tool powered by Landlock:
https://github.com/landlock-lsm/island
Island makes Landlock practical for everyday workflows by acting as a
high-level wrapper and policy manager. Developed alongside the kernel
feature and its Rust libraries, it bridges the gap between raw security
mechanisms and user activity through:
- Zero-code integration: Runs existing binaries without modification.
- Declarative policies: Uses TOML profiles instead of code-based rules.
- Context-aware activation: Automatically applies security profiles
based on your current working directory.
- Full environment isolation: Manages isolated workspaces (XDG
directories, TMPDIR) in addition to access control.
- Transparent shell integration: Automatically sandboxes commands in
your shell without changing your workflow.
- Zero-privilege operation: No root access or special capabilities
required.
- Layered protection: Multiple profiles compose cleanly with
deterministic ordering.
It's a work in progress, so be careful.
Feedback welcome!
Regards,
Mickaël
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [oss-security] Island: Sandboxing tool powered by Landlock
[not found] ` <303DA753-37EF-4530-AA63-4C3579E9A454.1@smtp-inbound1.duck.com>
@ 2025-12-05 12:35 ` kf503bla
0 siblings, 0 replies; 2+ messages in thread
From: kf503bla @ 2025-12-05 12:35 UTC (permalink / raw)
To: oss-security@lists.openwall.com
Cc: landlock@lists.linux.dev, linux-security-module@vger.kernel.org,
lwn@lwn.net
Why would you publish it on github? Please consider codeberg or src hut.
Sent with Proton Mail secure email.
On Friday, December 5th, 2025 at 5:14 PM, Mickaël Salaün <mic_at_digikod.net_kf503bla@duck.com> wrote:
>
>
> Hi,
>
> I just released Island, a sandboxing tool powered by Landlock:
> https://github.com/landlock-lsm/island
>
> Island makes Landlock practical for everyday workflows by acting as a
> high-level wrapper and policy manager. Developed alongside the kernel
> feature and its Rust libraries, it bridges the gap between raw security
> mechanisms and user activity through:
> - Zero-code integration: Runs existing binaries without modification.
> - Declarative policies: Uses TOML profiles instead of code-based rules.
> - Context-aware activation: Automatically applies security profiles
> based on your current working directory.
> - Full environment isolation: Manages isolated workspaces (XDG
> directories, TMPDIR) in addition to access control.
> - Transparent shell integration: Automatically sandboxes commands in
> your shell without changing your workflow.
> - Zero-privilege operation: No root access or special capabilities
> required.
> - Layered protection: Multiple profiles compose cleanly with
> deterministic ordering.
>
> It's a work in progress, so be careful.
>
> Feedback welcome!
>
> Regards,
> Mickaël
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2025-12-05 13:27 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-12-05 11:22 Island: Sandboxing tool powered by Landlock Mickaël Salaün
[not found] ` <303DA753-37EF-4530-AA63-4C3579E9A454.1@smtp-inbound1.duck.com>
2025-12-05 12:35 ` [oss-security] " kf503bla
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).