Bubblewrap example scripts
This repository contains example profile scripts for several programs to show how bubblewrap can be used to sandbox applications.
To automatically use the sandboxed applications profiles, copy the scripts to /usr/local/bin and make them executable. By default a seccomp bpf file is expected in that directory as well. Use the exportFilter program to generate the seccomp bpf file. You can create individual filters by specifying syscalls to be blacklisted or whitelisted using the defined macros.
The sandboxing scripts expect the host system to run a wayland compositor as well as pipewire when audio is required.
This repository is not associated with the official bubblewrap project
Using the provided scripts to sandbox linux desktop applications only provides limited protection as there are several weak points like the X-Window-Server and Dbus IPC that need to be isolated as well to prevent sandbox escape. See Sandbox Status for details on the example scripts
If not otherwise documented in the profile script, the sandbox environment should be effective in that is will reduce the impact of successful compromise without allowing trivial sandbox escape.
- support xdg-portal APIs
- find a way to mount pipewire socket dynamically
- isolate abstract sockets in network namespaces