# Firejail profile used by Shellbox when shelling out # Most rules are applied via command-line flags controlled by the # Shell::RESTRICTION_* constants. # Rules added to this file must be compatible with every command that could # be invoked. If something might need to be disabled, then it should be added # as a Shell:RESTRICTION_* constant instead so that commands can opt-in/out. # See for # syntax documentation. # Optionally allow sysadmins to set extra restrictions that apply to their # Shellbox setup, e.g. disallowing access to extra private directories. include /etc/firejail/shellbox.local # Include any global firejail customizations. include /etc/firejail/globals.local # Drop all capabilities caps.drop all # Disallow system directories blacklist /sbin blacklist /usr/sbin blacklist /usr/local/sbin # /run typically contains many exploitable UNIX sockets # But also /run/firejail which needs to be available noblacklist /run/firejail blacklist /run/* # Disallow system files blacklist /etc/shadow blacklist /etc/ssh blacklist /root # Disallow system management blacklist ${PATH}/umount blacklist ${PATH}/mount blacklist ${PATH}/fusermount blacklist ${PATH}/su blacklist ${PATH}/sudo blacklist ${PATH}/xinput blacklist ${PATH}/evtest blacklist ${PATH}/xev blacklist ${PATH}/strace blacklist ${PATH}/nc blacklist ${PATH}/ncat