https://github.com/msantos/noprivexec
noprivexec: disable setuid privileges
https://github.com/msantos/noprivexec
exec pledge prctl procctl setuid
Last synced: 2 months ago
JSON representation
noprivexec: disable setuid privileges
- Host: GitHub
- URL: https://github.com/msantos/noprivexec
- Owner: msantos
- License: isc
- Created: 2021-07-18T11:42:20.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2024-11-26T12:34:55.000Z (6 months ago)
- Last Synced: 2025-02-13T05:30:08.383Z (4 months ago)
- Topics: exec, pledge, prctl, procctl, setuid
- Language: C
- Size: 15.6 KB
- Stars: 1
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# SYNOPSIS
noprivexec *cmd* *...*
# DESCRIPTION
noprivexec: disable setuid privileges
`noprivexec` disables the ability to use setuid privileges before executing
a command.# EXAMPLES
```
$ noprivexec echo test
test$ noprivexec sudo echo test
sudo: effective uid is not 0, is /usr/bin/sudo on a file system with the 'nosuid' option set or an NFS file system without root privileges?$ noprivexec ping 8.8.8.8
ping: icmp open socket: Operation not permitted
```# Build
```
make#### static executable using musl
./musl-make
```# OPTIONS
-h, --help
: usage summary# ALTERNATIVES
* [noprivexec-go](https://codeberg.org/msantos/noprivexec-go)
* [noprivexec-rs](https://codeberg.org/msantos/noprivexec-rs)