logoalt Hacker News

c2xlZXB5today at 12:43 AM2 repliesview on HN

Maybe a dumb question, but couldn't you use seccomp to limit/deny the amount of syscalls the Python interpreter has access to? For example, if you don't want it messing with your host filesystem, you could just deny it from using any filesystem related system calls? What is the benefit of using a completely separate interpreter?


Replies

thundergolfertoday at 5:03 AM

https://github.com/butter-dot-dev/bvisor is pushing in that direction

oofbeytoday at 1:06 AM

Yours is a valid approach. But you always gotta wonder if there’s some way around it. Starting with runtime that has ways of accessing every aspect of your system - there are a lot of ways an attacker might try to defeat the blocks you put in place. The point of starting with something super minimal is that the attack surface is tiny. Really hard to see how anything could break out.

show 2 replies