Tool and Usage
|Latest release||0.6.2 |
Why this tool?
A tool like subuser can useful to test software from untrusted sources.
How it works
Subuser works together with Docker. Docker will provide the isolated environment while subuser will give access to the related resources. This way a particular program can only access those resources that it is allowed to access. The result is slightly similar how Android permissions work.
Usage and audience
subuser is commonly used for software testing. Target users for this tool are general public.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + More than 10 contributors
- + More than 500 GitHub stars
- + The source code of this software is available
Supported operating systems
Subuser is known to work on Linux.
Similar tools to subuser:
The bane tool is an AppArmor profile generator for Docker containers. It helps with creating the appropriate profile for confinement on system level.
The sudo_pair tool is a sudo plugin that allows for more strict sudo access to systems. It requires another human to approve a sudo session and provides monitoring by cloning the screen. The approver can review the session in real-time.
Anchore is a toolkit to perform in-depth container analysis, inspection, and controlling them. Among security scanning, it can do a wide range of functions.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
This tool is categorized as a application privilege restriction tool.