UnknownSec Bypass
403
:
/
snap
/
snapd
/
23545
/
usr
/
lib
/
snapd
/
apparmor.d
/
abstractions
/ [
drwxrwxr-x
]
Menu
Upload
Mass depes
Mass delete
Terminal
Info server
About
name :
private-files-strict
# vim:syntax=apparmor # privacy-violations-strict contains additional rules for sensitive # files that you want to explicitly deny access abi <abi/4.0>, include <abstractions/private-files> # potentially extremely sensitive files audit deny @{HOME}/.aws/{,**} mrwkl, audit deny @{HOME}/.gnupg/{,**} mrwkl, audit deny @{HOME}/.ssh/{,**} mrwkl, audit deny @{HOME}/.gnome2_private/{,**} mrwkl, audit deny @{HOME}/.gnome2/ w, audit deny @{HOME}/.gnome2/keyrings/{,**} mrwkl, # don't allow access to any gnome-keyring modules audit deny @{run}/user/[0-9]*/keyring** mrwkl, audit deny @{HOME}/.mozilla/{,**} mrwkl, audit deny @{HOME}/.config/ w, audit deny @{HOME}/.config/chromium/{,**} mrwkl, audit deny @{HOME}/.config/evolution/{,**} mrwkl, audit deny @{HOME}/.evolution/{,**} mrwkl, audit deny @{HOME}/.{,mozilla-}thunderbird/{,**} mrwkl, audit deny @{HOME}/.kde{,4}/{,share/,share/apps/} w, audit deny @{HOME}/.kde{,4}/share/apps/kmail{,2}/{,**} mrwkl, audit deny @{HOME}/.kde{,4}/share/apps/kwallet/{,**} mrwkl, audit deny @{HOME}/.local/share/kwalletd/{,**} mrwkl, # Include additions to the abstraction include if exists <abstractions/private-files-strict.d>
Copyright © 2025 - UnknownSec