Skip to content

Sandboxing - Could you disable network syscalls? #1

@danielloader

Description

@danielloader

This is a great project and I've been looking at the thread over at the bun project, and the subsequent node pull request that's going well, but I have a question.

I'd love to run something like a FaaS using this, but to do so I'd need to disable networking, and ideally filesystem calls (or any classification of syscalls I guess) so I can allow users to run untrusted code on the platform.

Would this project be able to handle this?

I'm aware of containerised runtimes having seccomp style constraints at runtime but this would apply to the parent rust process as well as the embedded node runtime.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions