Skip to content
[WIP] Security-focused binary firewall with policy handling capabilities
Rust C
Branch: master
Clone or download

Latest commit

Fetching latest commit…
Cannot retrieve the latest commit at this time.


Type Name Latest commit message Commit time
Failed to load latest commit information.


Security-focused Linux-based binary firewall with policy handling capabilities


confine is a security-focused syscall-based firewall that supports generating policies for Linux security enforcers. Enforcers are defined as execution runtimes supported by the operating system that take a profile and conduct host-based policy enforcement, such as seccomp.

While Linux supports a lot of these well-documented security enforcers over the lifespan of the operating system, many of them have given up usability for the ability to support fine-grained configurability, making them increasingly complex to write. confine enables security and devops engineers to not only generate enforcer profiles from a common configuration format, but also test these policies against actual applications under an unprivileged sandboxed environment. This not only enables a user to improve security with intrusion detection and monitoring, but also fill in the complexity gap in hand-rolling security profiles for production environments.


  • Fast system call tracing with either ptrace or EBPF mode (WIP)
    • Supports syscall trace serialization to JSON
    • Isolated process tracing with Linux namespaces and capabilities
  • Policy generation for enforcer backends
    • Currently supports Docker seccomp profile generation, and AppArmor


To build and install the confine CLI tool:

$ cargo install
$ confine -h

To run a normal execution trace:

$ confine -- mycommand [arg1] ...

This will run confine as an elevated strace clone, and can be configured further, such as the output format, or the tracing mechanism:

$ confine --trace_mode ebpf --json  -- mycommand [arg1] ...

To run a policy against an execution trace, we can define a common trace policy in TOML, and execute as so:

$ confine --policy mypolicy.toml -- mycommand [arg1] ...

If the policy executed defines an enforcer as part of the manifest, we can also generate a profile for it as so:

$ confine --policy mypolicy.toml --generate_profile -- mycommand [arg1] ...

See also

You can’t perform that action at this time.