feat: small wording fixes
This commit is contained in:
@@ -15,28 +15,28 @@ const linuxLayers = [
|
||||
icon: Lock,
|
||||
name: 'Landlock',
|
||||
tag: 'Filesystem',
|
||||
desc: 'Kernel-level filesystem access control. Enforces granular read/write permissions below userspace — processes cannot escalate their own access.',
|
||||
desc: 'Kernel-level filesystem access control. Enforces granular read/write permissions below userspace. Processes cannot escalate their own access.',
|
||||
detail: 'Linux 5.13+',
|
||||
},
|
||||
{
|
||||
icon: ShieldCheck,
|
||||
name: 'Seccomp BPF',
|
||||
tag: 'Syscalls',
|
||||
desc: 'Blocks 27 dangerous system calls at the kernel boundary — ptrace, mount, kexec, module loading, and BPF manipulation are all denied.',
|
||||
desc: 'Blocks 27+ dangerous system calls at the kernel boundary. ptrace, mount, kexec, module loading, and BPF manipulation are all denied.',
|
||||
detail: 'Linux 3.5+',
|
||||
},
|
||||
{
|
||||
icon: Eye,
|
||||
name: 'eBPF Monitoring',
|
||||
tag: 'Visibility',
|
||||
desc: 'Traces syscall exits in real time across all layers. Every permission denial is captured instantly with full context — process, path, and reason.',
|
||||
desc: 'Traces syscall exits in real time across all layers. Every permission denial is captured instantly with full context: process, path, and reason.',
|
||||
detail: 'Linux 4.15+',
|
||||
},
|
||||
{
|
||||
icon: Wifi,
|
||||
name: 'TUN + SOCKS5 Proxy',
|
||||
tag: 'Network',
|
||||
desc: 'Transparent network capture at the kernel level via TUN device. All TCP/UDP traffic is routed through the proxy — even binaries that ignore env vars.',
|
||||
desc: 'Transparent network capture at the kernel level via TUN device. All TCP/UDP traffic is routed through the proxy, even binaries that ignore env vars.',
|
||||
detail: 'Any kernel',
|
||||
},
|
||||
]
|
||||
@@ -99,7 +99,7 @@ export function Layers() {
|
||||
</h2>
|
||||
<p className="text-muted-foreground font-serif text-lg leading-relaxed">
|
||||
{platform === 'linux'
|
||||
? 'Each layer operates independently. A bug in one is caught by another. No single point of failure — every constraint is enforced at the kernel level.'
|
||||
? 'Each layer operates independently. A bug in one is caught by another. No single point of failure. Every constraint is enforced at the kernel level.'
|
||||
: 'macOS Seatbelt enforces deny-by-default policies before any syscall completes. The sandbox profile is generated per-session with rules tailored to your project.'}
|
||||
</p>
|
||||
</div>
|
||||
@@ -152,7 +152,7 @@ export function Layers() {
|
||||
) : (
|
||||
<>
|
||||
<span className="text-primary font-medium">No dependencies.</span>{' '}
|
||||
macOS sandboxing uses only built-in OS capabilities — no packages to install.
|
||||
macOS sandboxing uses only built-in OS capabilities. No packages to install.
|
||||
Run{' '}
|
||||
<code className="font-mono text-xs text-foreground bg-card/50 px-1.5 py-0.5 rounded">
|
||||
greywall check
|
||||
|
||||
Reference in New Issue
Block a user