logoalt Hacker News

dmos62yesterday at 6:27 PM1 replyview on HN

Interesting. How are the security filters implemented?


Replies

edf13yesterday at 6:30 PM

Every system call, file access, net access etc is forced through a local “proxy” where 17 individual filters check what’s going on.

Everything is done locally via our grith cli tool.

Happy to answer any questions on [email protected] too