Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Don't feel you have to merge this, I got time to play a lot with toolhive last night and hacked up a way of injecting seccomp profiles during container runtime init
To be honest docker and podman have a good set of defaults, but I was thinking about how limited the scope of MCP servers tends to be (most are limited to specialised jobs) and so custom seccomp profiles seemed worth exploring
I really have not had much time to test this and so please don't feel a need to merge quickly if at all, I don't want to introduce a security risk from me hacking away with curiosity.
iirc correctly, the order is:
Server-specific overrides: Individual configuration in each server's
permissions.seccomp
section in registry.jsonGlobal defaults: From
seccomp_defaults
section in registry.jsonFallback defaults: Hardcoded in
NewProfile()
function, used only if registry.json is missing and to make sure a footgun does not happenYou can see the rules applied using inspect