_            _    _        _         _
      /\ \         /\ \ /\ \     /\_\      / /\
      \_\ \       /  \ \\ \ \   / / /     / /  \
      /\__ \     / /\ \ \\ \ \_/ / /     / / /\ \__
     / /_ \ \   / / /\ \ \\ \___/ /     / / /\ \___\
    / / /\ \ \ / / /  \ \_\\ \ \_/      \ \ \ \/___/
   / / /  \/_// / /   / / / \ \ \        \ \ \
  / / /      / / /   / / /   \ \ \   _    \ \ \
 / / /      / / /___/ / /     \ \ \ /_/\__/ / /
/_/ /      / / /____\/ /       \ \_\\ \/___/ /
\_\/       \/_________/         \/_/ \_____\/
bubblewrap 0.10.0
Dependencies: libcap@2.64
Channel: guix
Location: gnu/packages/virtualization.scm (gnu packages virtualization)
Home page: https://github.com/containers/bubblewrap
Licenses: LGPL 2.0+
Synopsis: Unprivileged sandboxing tool
Description:

Bubblewrap is aimed at running applications in a sandbox, restricting their access to parts of the operating system or user data such as the home directory. Bubblewrap always creates a new mount namespace, and the user can specify exactly what parts of the file system should be made visible in the sandbox. These directories are mounted with the nodev option by default and can be made read-only.

Total results: 1