this post was submitted on 01 Jul 2024
245 points (100.0% liked)

Linux

8312 readers
234 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of [email protected] and The GIMP

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] [email protected] 1 points 1 year ago (1 children)

Can't it use built in OS mechanisms for that? Surely you could figure out a way to only give it permissions it needs. Maybe break it up into two separate processes.

[โ€“] [email protected] 1 points 1 year ago

That just sounds like root with extra steps (trying to implement OS security policies in a remote terminal utility)