Per-process network monitoring for your terminal with deep packet inspection. Cross-platform, sandboxed.
-
Updated
May 11, 2026 - Rust
Per-process network monitoring for your terminal with deep packet inspection. Cross-platform, sandboxed.
Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into the kernel.
Lightweight, container-free sandbox for running commands with network and filesystem restrictions
A Go library for the Linux Landlock sandboxing feature
A Rust library for the Linux Landlock sandboxing feature
Container-free, deny-by-default sandbox for AI coding agents. Kernel-enforced filesystem, network, and syscall isolation for Linux and macOS
Run AI coding agents in hardened container sandboxes.
A lightweight command sandbox for Linux, secure-by-default, built on Landlock.
Linux kernel - See Landlock issues
Painless Linux sandboxing API
Set of modifications for Deno to add subprocess sandboxing
Restrict process execution and file access in Kubernetes Pods with Landlock
A command line tool for playing with Linux 5.13's Landlock feature
Next generation of the KISS Package manager
Add a description, image, and links to the landlock topic page so that developers can more easily learn about it.
To associate your repository with the landlock topic, visit your repo's landing page and select "manage topics."