You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(fspy): improve tracking static executables using seccomp_unotify (#258)
# Improve tracking static executables using seccomp_unotify
Enhanced the Linux syscall tracking to capture more file system operations and fixed a blocking issue in the tokio runtime.
### What changed?
- Fixed a blocking issue in the tokio runtime by moving `tokio_command.spawn()` to `spawn_blocking`
- Improved syscall handler to track more file system operations:
- Added support for `execve` and `execveat` syscalls
- Added support for `getdents` and `getdents64` syscalls
- Added support for `stat`, `lstat`, `newfstatat`, and `fstatat` syscalls
- Added support for `openat2` syscall
- Improved path resolution for relative paths
- Properly tracked file access modes (read, write, readwrite)
- Refactored the syscall handler code into separate modules for better organization
- Added comprehensive tests for all the new syscall tracking capabilities
### Why make this change?
Tracking static executables with `seccomp_unotify` was half-baked, but now that we should officially support oxlint type-aware linting, it needs to be polished.
0 commit comments