Clone this repo:

Branches

  1. d92390b Do IWYU for FRIEND_TEST_ALL_PREFIXES() in headers by Lei Zhang · 25 hours ago main
  2. 77958c6 Stop warmup of dbghelp.dll by Alex Gough · 2 days ago
  3. 33ddadc Allow access to paths for Corsola for Landlock GPU policy by Ben Scarlato · 2 days ago
  4. e71d5ed [Windows] Move FilterEnvironment to the Windows utilities. by James Forshaw · 4 days ago
  5. a659aef Fix more IWYU issues by Victor Hugo Vianna Silva · 5 days ago

Sandbox Library

This directory contains platform-specific sandboxing libraries. Sandboxing is a technique that can improve the security of an application by separating untrustworthy code (or code that handles untrustworthy data) and restricting its privileges and capabilities.

Each platform relies on the operating system's process primitive to isolate code into distinct security principals, and platform-specific technologies are used to implement the privilege reduction. At a high-level:

  • mac/ uses the Seatbelt sandbox. See the detailed design for more.
  • linux/ uses namespaces and Seccomp-BPF. See the detailed design for more.
  • win/ uses a combination of restricted tokens, distinct job objects, alternate desktops, and integrity levels. See the detailed design for more.

Built on top of the low-level sandboxing library is the //sandbox/policy component, which provides concrete policies and helper utilities for sandboxing specific Chromium processes and services. The core sandbox library cannot depend on the policy component.