Run an untrusted C program in a sandbox in Linux that prevents it from opening files, forking, etc.?
I have used Systrace to sandbox untrusted programs both interactively and in automatic mode. It has a ptrace()-based backend which allows its use on a Linux system without special privileges, as well as a far faster and more poweful backend which requires patching the kernel. It is also possible to create a sandbox on Unix-like … Read more