landrun
by Zouuup
Landrun is a lightweight, user-friendly Linux sandbox tool that leverages kernel-level Landlock security to run processes with fine-grained filesystem and network restrictions without requiring root or containers.
Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into the kernel.
Primary Use Case
Landrun is used to securely sandbox Linux commands and processes by restricting their filesystem and network access, making it ideal for developers, system administrators, and security professionals who want to isolate applications without complex configurations or elevated privileges. It enables running potentially risky or untrusted commands safely on Linux systems with minimal overhead.
- Kernel-level security using Landlock
- Lightweight and fast execution
- Fine-grained access control for directories and files
- Support for read and write paths
- Path-specific execution permissions
- TCP network access control (binding and connecting)
- No root or container requirements
- Auditable and minimal overhead
Installation
- Run `go install github.com/zouuup/landrun/cmd/landrun@latest` for quick install
- Clone the repository: `git clone https://github.com/zouuup/landrun.git`
- Build from source: `cd landrun` then `go build -o landrun cmd/landrun/main.go`
- Copy binary to system path: `sudo cp landrun /usr/local/bin/`
- Install via Arch AUR stable package maintained by Vcalv
- Install via Arch AUR latest commit package maintained by juxuanu
- Install on Slackware using Slackbuild maintained by r1w1s1 with `sudo sbopkg -i packagename`
Usage
>_ landrun [options] <command> [args...]Run a Linux command inside the Landrun sandbox with specified options
>_ --ro <path>Allow read-only access to the specified path
>_ --rox <path>Allow read-only access with execution permissions to the specified path
>_ --rw <path>Allow read-write access to the specified path
>_ --rwx <path>Allow read-write access with execution permissions to the specified path
>_ --bind-tcp <port>Allow binding to the specified TCP port
>_ --connect-tcp <port>Allow connecting to the specified TCP port
>_ --env <var>Pass environment variables to the sandboxed command
>_ --best-effortEnable best effort mode to fall back to less restrictive sandboxing if needed
>_ --log-level <level>Set the logging level (error, info, debug)
>_ --unrestricted-networkDisable all network restrictions allowing full network access
>_ --unrestricted-filesystemDisable all filesystem restrictions allowing full filesystem access
>_ --add-execAutomatically add the executing binary to read-only with execution permissions
>_ --lddAutomatically add required libraries to read-only with execution permissions
- Integrate Landrun into CI/CD pipelines to sandbox build and test processes, reducing risk of supply chain attacks.
- Use Landrun to isolate suspicious or untrusted binaries during incident response to prevent lateral movement.
- Combine Landrun with host-based monitoring tools to enforce least privilege and detect anomalous process behavior.
- Leverage Landrun’s network restrictions to simulate and test attacker network tactics in red team exercises.
- Deploy Landrun for developer environments to safely test new code with minimal risk to host system integrity.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about landrun. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
This tool hasn't been indexed yet. Request indexing to enable AI chat.
Admin will review your request within 24 hours
Related Tools

rustdesk
rustdesk/rustdesk
An open-source remote desktop application designed for self-hosting, as an alternative to TeamViewer.
osquery
osquery/osquery
SQL powered operating system instrumentation, monitoring, and analytics.
macOS-Security-and-Privacy-Guide
drduh/macOS-Security-and-Privacy-Guide
Community guide to securing and improving privacy on macOS.
How-To-Secure-A-Linux-Server
imthenachoman/How-To-Secure-A-Linux-Server
An evolving how-to guide for securing a Linux server.
Atlas
Atlas-OS/Atlas
🚀 An open and lightweight modification to Windows, designed to optimize performance, privacy and usability.
fail2ban
fail2ban/fail2ban
Daemon to ban hosts that cause multiple authentication errors
