Codex cli

From UVOO Tech Wiki
Revision as of 23:07, 7 May 2026 by Busk (talk | contribs) (Created page with "2. Trusted Binaries The risk is considered low because bubblewrap is a small, heavily audited, and "security-first" piece of software. Its entire purpose is to provide isolati...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
  1. Trusted Binaries The risk is considered low because bubblewrap is a small, heavily audited, and "security-first" piece of software. Its entire purpose is to provide isolation. Most Linux security experts consider it safer to allow bwrap to function (so it can sandbox other dangerous code) than to leave it broken.
  2. Targeted vs. Global This is significantly safer than the alternative method of running sudo sysctl -w kernel.unprivileged_userns_clone=1.

The Global Method: Allows every program on your computer (including a malicious script or a compromised web browser) to create namespaces.

The AppArmor Method: Limits that power strictly to the bwrap utility.

Summary This configuration is the "middle ground" of security. It restores functionality to your development tools while keeping the rest of the operating system locked down. The risk is that you are placing absolute trust in the integrity of the bwrap developers.