[GH-ISSUE #655] Comparison with minijail #455

Closed
opened 2026-05-05 05:54:04 -06:00 by gitea-mirror · 1 comment
Owner

Originally created by @fkarl423 on GitHub (Jul 28, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/655

The chromium OS project seems to have developed something quite familiar to firejail that I would like to point out: It's called minijail and also applies seccomp filter to a process.
https://www.chromium.org/chromium-os/developer-guide/chromium-os-sandboxing

Maybe this provides some ideas on what to implement in firejail or maybe it would even be possible to work together and merge both project. No Idead how realistic this is just wanted to point it out.

Originally created by @fkarl423 on GitHub (Jul 28, 2016). Original GitHub issue: https://github.com/netblue30/firejail/issues/655 The chromium OS project seems to have developed something quite familiar to firejail that I would like to point out: It's called minijail and also applies seccomp filter to a process. https://www.chromium.org/chromium-os/developer-guide/chromium-os-sandboxing Maybe this provides some ideas on what to implement in firejail or maybe it would even be possible to work together and merge both project. No Idead how realistic this is just wanted to point it out.
gitea-mirror 2026-05-05 05:54:04 -06:00
Author
Owner

@netblue30 commented on GitHub (Jul 28, 2016):

Thanks for the info.

<!-- gh-comment-id:236017075 --> @netblue30 commented on GitHub (Jul 28, 2016): Thanks for the info.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#455
No description provided.