3
I Use This!
Inactive
Analyzed about 21 hours ago. based on code collected about 21 hours ago.

Project Summary

PRoot is a user-space implementation of "chroot", "mount --bind", and "binfmt_misc". This means that users don't need any privilege or setup to do things like: using an arbitrary directory as the new root filesystem, making files accessible somewhere else in the filesystem hierarchy, or executing programs built for another CPU architecture transparently through QEMU user-mode. Also, developers can add their own features or use PRoot as a Linux process instrumentation engine thanks to its extension mechanism. Technically PRoot relies on "ptrace", an unprivileged system-call available in every Linux kernel.

Tags

binfmt_misc chroot cross_compilers fake filesystem instrumentation linux mount mount_bind permission process ptrace qemu root rootfs sandbox

Badges

In a Nutshell, PRoot...

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    you can embed statistics from Open Hub on your site
  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    compare projects before you chose one to use
About Project Security

Languages

C
85%
shell script
8%
9 Other
7%

30 Day Summary

Jan 12 2026 — Feb 11 2026

12 Month Summary

Feb 11 2025 — Feb 11 2026