this post was submitted on 01 Jul 2024
246 points (98.8% liked)

Linux

5218 readers
12 users here now

A community for everything relating to the linux operating system

Also check out !linux_memes@programming.dev

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] possiblylinux127@lemmy.zip 1 points 4 months ago (1 children)

Can't it use built in OS mechanisms for that? Surely you could figure out a way to only give it permissions it needs. Maybe break it up into two separate processes.

[โ€“] Sethayy@sh.itjust.works 1 points 4 months ago

That just sounds like root with extra steps (trying to implement OS security policies in a remote terminal utility)