Closed
Description
As much as I understand chiadog, it should only require read access to INFO-level debug.log
and Internet connectivity.
Therefore, in order to encapsulate chiadog from doing any (thankfully / hopefully theoretical) malicious activity, shouldn't it already be enough to run chiadog as a Unix user with limited permissions, e.g. chiadog
and setting up debug.log
's Unix file permissions with a e.g. group chialog
, which User chiadog
is a member of?
Metadata
Metadata
Assignees
Labels
No labels