1
I Use This!
Activity Not Available
Analyzed over 3 years ago. based on code collected over 4 years ago.

Project Summary

encapsulate provides its client process the same environment it's started in, except for some limitations:
encapsulate remounts the whole filesystem read-only, except for user-selectable regions which are mounted read-write. It also isolates the process from the system's process table, network interface, IPC, and shared memory tables.

Tags

No tags have been added

In a Nutshell, encapsulate...

ISC License
Permitted

Commercial Use

Modify

Distribute

Forbidden

Hold Liable

Required

Include Copyright

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    by exploring contributors within projects, you can view details on every commit they have made to that project
  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    search using multiple tags to find exactly what you need
About Project Security

Languages

C
94%
Make
6%

30 Day Summary

Sep 24 2018 — Oct 24 2018

12 Month Summary

Oct 24 2017 — Oct 24 2018

Ratings

Be the first to rate this project
Click to add your rating
  
Review this Project!