From deb6c12454191b7aeff3d259612a00427d1aa6a1 Mon Sep 17 00:00:00 2001 From: rusty-snake <41237666+rusty-snake@users.noreply.github.com> Date: Thu, 9 Jul 2020 10:49:17 +0000 Subject: hardening some profiles (#3505) * hardening some profiles - harden and fix flameshot - wruc: frogatto, ghostwriter - harden gnome-latex - add whitelist opt-in note to keepassxc - add comment to minetest - harden openarena, tremulous, xonotic - add profile for xonotic-sdl-wrapper * followup --- etc/profile-a-l/keepassxc.profile | 11 +++++++++++ 1 file changed, 11 insertions(+) (limited to 'etc/profile-a-l/keepassxc.profile') diff --git a/etc/profile-a-l/keepassxc.profile b/etc/profile-a-l/keepassxc.profile index d1893e412..6e35299be 100644 --- a/etc/profile-a-l/keepassxc.profile +++ b/etc/profile-a-l/keepassxc.profile @@ -23,6 +23,17 @@ include disable-programs.inc include disable-shell.inc include disable-xdg.inc +# You can enable whitelisting for keepassxc by uncommenting (or adding to you keepassxc.local) the following lines. +# If you do so, you MUST store your database under ${HOME}/Documents/KeePassXC/foo.kdbx +#mkdir ${HOME}/Documents/KeePassXC +#whitelist ${HOME}/Documents/KeePassXC +# Needed for KeePassXC-Browser +#mkfile ${HOME}/.mozilla/native-messaging-hosts/org.keepassxc.keepassxc_browser.json +#whitelist ${HOME}/.mozilla/native-messaging-hosts/org.keepassxc.keepassxc_browser.json +#mkdir ${HOME}/.config/keepassxc +#whitelist ${HOME}/.config/keepassxc +#include whitelist-common.inc + whitelist /usr/share/keepassxc include whitelist-usr-share-common.inc include whitelist-var-common.inc -- cgit v1.2.3-70-g09d2