3
I Use This!
Inactive
Analyzed 1 day ago. based on code collected 1 day ago.

Project Summary

PRoot is a user-space implementation of "chroot", "mount --bind", and "binfmt_misc". This means that users don't need any privilege or setup to do things like: using an arbitrary directory as the new root filesystem, making files accessible somewhere else in the filesystem hierarchy, or executing programs built for another CPU architecture transparently through QEMU user-mode. Also, developers can add their own features or use PRoot as a Linux process instrumentation engine thanks to its extension mechanism. Technically PRoot relies on "ptrace", an unprivileged system-call available in every Linux kernel.

Tags

binfmt_misc chroot cross_compilers fake filesystem instrumentation linux mount mount_bind permission process ptrace qemu root rootfs sandbox

Badges

In a Nutshell, PRoot...

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    use of OSS increased in 65% of companies in 2016
  • ...
    data presented on the Open Hub is available through our API
  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    check out hot projects on the Open Hub
About Project Security

Languages

C
85%
shell script
8%
9 Other
7%

30 Day Summary

Aug 1 2025 — Aug 31 2025

12 Month Summary

Aug 31 2024 — Aug 31 2025