Firejail
github.com/netblue30/firejailFirejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. Written in C, virtually no dependencies, runs on any modern Linux system, with no daemon running in the background, no complicated configuration, and it's super lightweight and super secure, since all actions are implemented by the kernel. It includes security profiles for over 800 common Linux applications. FireJail is recommended for running any app that may potential pose some kind of risk, such as torrenting through Transmission, browsing the web, opening downloaded attachments.
- Homepage: github.com/netblue30/firejail
- GitHub: github.com/netblue30/firejail
- Web info: web-check.xyz/results/github.com
Firejail Source Code
Author
Description
Linux namespaces and seccomp-bpf sandbox
Homepage
https://firejail.wordpress.comLicense
GPL-2.0
Created
08 Aug 15
Last Updated
07 Apr 24
Latest version
Primary Language
C
Size
20,710 KB
Stars
5,410
Forks
544
Watchers
5,410
Language Usage
Star History
Top Contributors
-
@glitsj16 (1175)
-
@netblue30 (828)
-
@kmk3 (796)
-
@smitsohu (790)
-
@Fred-Barclay (494)
-
@SkewedZeppelin (341)
-
@rusty-snake (339)
-
@reinerh (332)
-
@startx2017 (120)
-
@dependabot[bot] (105)
-
@SYN-cook (90)
-
@Vincent43 (79)
-
@manevich (60)
-
@avoidr (59)
-
@topimiettinen (58)
-
@valoq (48)
-
@Neo00001 (47)
-
@chiraag-nataraj (45)
-
@vismir2 (40)
-
@kris7t (37)
-
@crass (35)
-
@bbhtt (35)
-
@jose1711 (30)
-
@tredondo (29)
-
@flacks (27)
-
@nidamanx (24)
-
@veloute (24)
-
@Kishore96in (24)
-
@KellerFuchs (21)
-
@pirate486743186 (15)
Recent Commits
-
netblue30 (07 Apr 24)
landlock fix for old kernel versions
-
Kelvin M. Klann (05 Apr 24)
RELNOTES: add profile items Relates to #6298 #6299 #6300.
-
Kelvin M. Klann (05 Apr 24)
profiles: clarify and add opengl-game to profile.template (#6300) To make it consistent with the other include profiles. See etc/templates/profile.template. With this, all `etc/inc/allow-*` files are listed in profile.template. The explanation is based on a comment by @rusty-snake[1]. Relates to #4071. This is a follow-up to #6299. [1] https://github.com/netblue30/firejail/pull/4071#issuecomment-822003473
-
Kelvin M. Klann (03 Apr 24)
profiles: add allow-php.inc to profile.template (#6299) To make it consistent with the other include profiles. See etc/templates/profile.template. Note: It is not currently included in any profile. Added on commit 89f30f1f2 ("Create allow-php.inc", 2020-01-25). This is a follow-up to #6298.
-
Kelvin M. Klann (30 Mar 24)
profiles: add allow-nodejs.inc to profile.template (#6298) To make it consistent with the other include profiles. See etc/templates/profile.template. Relates to #3866 #5881.
-
Kelvin M. Klann (30 Mar 24)
RELNOTES: move bugfix item into profiles Relates to #5601 #5618.
-
Kelvin M. Klann (28 Mar 24)
RELNOTES: add bugfix and profile items Relates to #5717 #6049 #6051 #6052.
-
Kelvin M. Klann (27 Mar 24)
RELNOTES: add modif and ci items Relates to #5953 #5957.
-
Kelvin M. Klann (27 Mar 24)
RELNOTES: add profile items Relates to #6289 #6294.
-
glitsj16 (27 Mar 24)
pkglog: hardening (x11) (#6292)
-
glitsj16 (27 Mar 24)
New profile: gh (GitHub CLI) (#6293) Description: GitHub's official command-line tool. https://github.com/cli/cli
-
Kelvin M. Klann (27 Mar 24)
profiles: rename disable-X11.inc to disable-x11.inc (#6294) That is, make "X11" lowercase so that the order of the includes in the disable- section remain the same when sorted with `LC_ALL=C`, as is the case for most of the other sections. That is also likely to be the default in text editors (such as in vim on Arch), so this should make the disable- section more consistent and easier to sort when editing the profile. Also, keep the old include as a redirect to the new one for now to avoid breakage. Commands used to search and replace: git mv etc/inc/disable-X11.inc etc/inc/disable-x11.inc git grep -Ilz 'disable-X11' -- etc | xargs -0 \ perl -pi -e 's/disable-X11/disable-x11/' Relates to #4462 #4854 #6070 #6289. This is a follow-up to #6286.
-
Kelvin M. Klann (27 Mar 24)
profiles: sort blacklist sections (#6289) See etc/templates/profile.template. This is a follow-up to #6286.
-
Kelvin M. Klann (25 Mar 24)
RELNOTES: add many profile items Relates to #5686 #5700 #5702 #5735 #5763 #5794 #5946 #6218.
-
Kelvin M. Klann (25 Mar 24)
RELNOTES: add build and profile items Relates to #6257 #6282 #6283 #6286 #6290.
-
Kelvin M. Klann (25 Mar 24)
build: sort.py: add and require -i to edit in-place (#6290) Similarly to `sed -i` and `perl -i`. This allows checking if sort.py correctly sorts the relevant lines in a profile without having to overwrite it, which makes debugging and testing easier (for example, in #6261). Note: If it finds items that are not sorted, it still sorts them, prints the diff and returns an error.
-
Kelvin M. Klann (25 Mar 24)
New profile: qemu-common.profile (#6287) Add a common profile to deduplicate entries and make qemu-related profiles redirect to it. Relates to #6255.
-
dependabot[bot] (25 Mar 24)
build(deps): bump github/codeql-action from 3.24.7 to 3.24.9 Bumps [github/codeql-action](https://github.com/github/codeql-action) from 3.24.7 to 3.24.9. - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](https://github.com/github/codeql-action/compare/3ab4101902695724f9365a384f86c1074d94e18c...1b1aada464948af03b950897e5eb522f92603cc2) --- updated-dependencies: - dependency-name: github/codeql-action dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
-
RundownRhino (24 Mar 24)
firefox: Add org.kde.kdeconnect to plasma integration comment (#6285) I recently set up KDE connect and plasma-browser-integration for firefox (Linux Mint 21.2) and needed this line in addition to the ones mentioned in the profile. Found it via running `firejail --profile=/etc/firejail/firefox.profile --dbus-user.log firefox`, trying to send links to device, and seeing what events get logged.
-
Kelvin M. Klann (24 Mar 24)
Merge pull request #6286 from kmk3/x11-none-improvements profiles: replace x11 socket blacklist with disable-X11.inc
-
Kelvin M. Klann (24 Mar 24)
profiles: deny access to ~/.config/autostart (#6257) The files in this directory are intended to be automatically executed when the user logs in. In which case, granting write access to this directory allows the program to easily escape the sandbox (by autostarting itself outside of firejail, for example). Misc: This was noticed on #6244.
-
Kelvin M. Klann (22 Mar 24)
profiles: replace x11 socket blacklist with disable-X11.inc Replace all occurrences of `blacklist /tmp/.X11-unix` with `include disable-X11.inc`, which blacklists more X11-related files. Commands used to search and replace: $ git grep -Ilz '^blacklist /tmp/.X11-unix' -- \ etc/profile*/*.profile | xargs -0 perl -0 -pi -e '\ s/\nblacklist \/tmp\/.X11-unix\n/\n/; \ s/(\ninclude disable-xdg.inc\n)/\ninclude disable-X11.inc$1/; \ s/(\ninclude disable-[^Xx\n]+\n)(\n|# )/$1include disable-X11.inc\n$2/' Note: The following files were also edited manually: * etc/profile-a-l/erd.profile * etc/profile-a-l/links-common.profile * etc/profile-m-z/termshark.profile * etc/profile-m-z/tmux.profile * etc/profile-m-z/tshark.profile Relates to #4462 #4854.
-
Kelvin M. Klann (22 Mar 24)
sstmp.profile: sort disable includes Move disable-X11.inc before disable-xdg.inc for consistency with other profiles. Added on commit 73a6fced2 ("New profile: ssmtp (#5544)", 2022-12-21).
-
Kelvin M. Klann (23 Mar 24)
gconf-editor: remove X11 socket blacklist It is a GUI program. It was apparently added by accident on commit 73321c597 ("Fixes (#2816)", 2019-07-01). Reported by @glitsj16 at https://github.com/netblue30/firejail/pull/6286#discussion_r1536618241
-
glitsj16 (23 Mar 24)
New profile: tqemu.profile (#6255) Description: QEMU frontend without libvirt. https://github.com/thanoulis/tqemu
-
Kelvin M. Klann (23 Mar 24)
k3b.profile: fix dvd drive detection (private-dev) (#6280) @hedgehog29 commented[1]: > It prevents k3b from detecting all dvd drives, incudling USB ones, and > it seems that also SATA. Fixes #6279. [1] https://github.com/netblue30/firejail/issues/6279#issue-2191392448
-
glitsj16 (20 Mar 24)
New profile: metadata-cleaner.profile (#6246) Description: Python GTK3 application to view and clean metadata in files, using mat2. https://gitlab.com/rmnvgr/metadata-cleaner
-
pirate486743186 (20 Mar 24)
remove porn-cli.profile (#6284) Co-authored-by: exponential <echo ZXhwb25lbnRpYWxtYXRyaXhAcHJvdG9ubWFpbC5jb20K | base64 -d>
-
Kelvin M. Klann (20 Mar 24)
build: fix "warning: "_FORTIFY_SOURCE" redefined" (#6283) The warning is being produced on Arch since pacman 6.1, which changed `-D_FORTIFY_SOURCE=2` to `-D_FORTIFY_SOURCE=3` in CFLAGS in makepkg.conf: $ pacman -Q gcc pacman gcc 13.2.1-5 pacman 6.1.0-3 $ makepkg [...] make -C src/lib gcc [...] -D_FORTIFY_SOURCE=2 [...] -Wp,-D_FORTIFY_SOURCE=3 [...] -c ../../src/lib/common.c -o ../../src/lib/common.o <command-line>: warning: "_FORTIFY_SOURCE" redefined <command-line>: note: this is the location of the previous definition To fix this, only add `-D_FORTIFY_SOURCE` to EXTRA_CFLAGS if it does not cause any warnings with CFLAGS and CPPFLAGS during compilation. The effect remains the same: The build system still defines the macro by default (if there are no warnings) and the user/distribution can still override it through CFLAGS/CPPFLAGS. Fixes #6282. Reported-by: @glitsj16
-
glitsj16 (19 Mar 24)
Rename etc/session-desktop.profile to etc/profile-m-z/session-desktop.profile
Firejail Website
Website
GitHub: Letβs build from here Β· GitHub
GitHub is where over 100 million developers shape the future of software, together. Contribute to the open source community, manage your Git repositories, review code like a pro, track bugs and features, power your CI/CD and DevOps workflows, and secure code before you commit it.
Redirects
Does not redirect
Security Checks
All 66 security checks passed
Server Details
- IP Address 140.82.112.4
- Hostname lb-140-82-112-4-iad.github.com
- Location San Francisco, California, United States of America, NA
- ISP GitHub Inc.
- ASN AS36459
Associated Countries
-
US
Saftey Score
Website marked as safe
100%
Blacklist Check
github.com was found on 0 blacklists
- ThreatLog
- OpenPhish
- PhishTank
- Phishing.Database
- PhishStats
- URLhaus
- RPiList Not Serious
- AntiSocial Blacklist
- PhishFeed
- NABP Not Recommended Sites
- Spam404
- CRDF
- Artists Against 419
- CERT Polska
- PetScams
- Suspicious Hosting IP
- Phishunt
- CoinBlockerLists
- MetaMask EthPhishing
- EtherScamDB
- EtherAddressLookup
- ViriBack C2 Tracker
- Bambenek Consulting
- Badbitcoin
- SecureReload Phishing List
- Fake Website Buster
- TweetFeed
- CryptoScamDB
- StopGunScams
- ThreatFox
- PhishFort
Website Preview
Firejail Reviews
More Linux Defenses
-
Open source GUI firewall for Linux, allowing you to block internet access for certain applications. Supports both simple and advanced mode, GUI and CLI options, very easy to use, lightweight/ low-overhead, under active maintenance and backed by a strong community. Installable through most package managers, or compile from source.
-
ClamTk is basically a graphical front-end for ClamAV, making it an easy to use, light-weight, on-demand virus scanner for Linux systems.
-
Locally checks for signs of a rootkit.
-
Open source intrusion prevention system capable of real-time traffic analysis and packet logging.
-
Clears cache and deletes temporary files very effectively. This frees up disk space, improves performance, but most importantly helps to protect privacy.
About the Data: Firejail
API
You can access Firejail's data programmatically via our API.
Simply make a GET
request to:
https://api.awesome-privacy.xyz/operating-systems/linux-defenses/firejail
The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.
About the Data
Beyond the user-submitted YAML you see above, we also augment each listing with additional data dynamically fetched from several sources. To learn more about where the rest of data included in this page comes from, and how it is computed, see the About the Data section of our About page.
Share Firejail
Help your friends compare Linux Defenses, and pick privacy-respecting software and services.
Share Firejail and Awesome Privacy with your network!