Skip to main content

All Questions

3 votes
1 answer
108 views

What security practices do I employ when building a library that requires low level root access to certain devices and files?

Backstory I am writing a library that accesses the kernel module, uinput which allows you to create or take control of devices in /dev/input/event#, and insert events into them. A simple usecase would ...
Anon's user avatar
  • 3,633