Flatpak sandbox hole coverage #2045
Replies: 2 comments 4 replies
-
I wonder if there's any legitimate reason to access anything on |
Beta Was this translation helpful? Give feedback.
-
I just want to reiterate a bit that it is really challenging to actually say any Elementary flatpak is safe. I don't like that but I believe it to be true.
Filesystem access is also always more scary than you think. I will say a lot of the list you posted is simply a packaging error.
These literally do nothing.
This is a legacy workaround to remove.
Flatpak mounts these icons by default.
Likely a legacy workaround no longer needed. -- Most of the DBus ones are indeed things that should be removed and apps should use the portal.
There is a "portal" for secrets however it only supports a subset of libsecret usage. But this permission does leak all keys from the host. |
Beta Was this translation helpful? Give feedback.
-
We're now starting to warn about sandbox holes in AppCenter, but there's a ton of different holes developers can poke and turning that into useful information is hard. I'm compiling here a list of different sandbox holes I've seen so we can discuss what they are, how to warn about them if we need to, etc:
--talk-name=org.freedesktop.FileManager1
is referenced by a few apps for opening Files with a specific file selected--talk-name=org.gnome.SettingsDaemon.MediaKeys"
shouldn't be accessed directly since MPRIS covers mediakeys. Not sure if there's undesired implications of being able to access this, like being able to control media playback of other apps?--talk-name=org.freedesktop.ScreenSaver'
I think apps are touching this instead of using the inhibit portal which is built into Gtk.Application. The implication here is that apps can prevent the computer from sleeping or force it to sleep without asking.--talk-name=org.gnome.Shell.Screenshot'
shouldn't be accessed directly because there's a screenshot portal. This means apps can take screenshots at any time. I think with access to X11 that is true regardless, so not sure if it's worth warning about this right now--talk-name=org.freedesktop.secrets
Not sure if there's a legit use for this, but it's the keychain. I think libsecret should be able to create its own internal keychain, so this I think means apps can just access passwords for the host which is bad--system-talk-name=io.elementary.pantheon.AccountsService",
Not sure if this should be combined with the System Settings flag or needs its own warning--share=network'
should we even warn about apps accessing the internet? Is that valuable information or just kind of assumed to be an okay thing to do?--filesystem=xdg-run
I think we should blanket warn about accessing this at all and not try to anticipate what people could be accessing hereBeta Was this translation helpful? Give feedback.
All reactions