While browsing this forum and other similar communities, I have often come across claims that the Flatpak sandbox is weak. However, this is usually not followed up with an explanation of how or why it is weak.
I am speaking only about the sandbox between the host and the application, not about the application’s ability to provide its own sandboxes (e.g. site isolation). Also, I am only referring to the sandbox in its default state (no added permissions) or the state of some applications that I will provide as examples. The reason that I am clarifying this is because the only decently detailed explanation of potential sandbox weakness that I have seen relies on the poor default permissions of popular applications (https://hanako.codeberg.page).
I am wondering if there are other resources that outline actual sandbox weaknesses in Flatpak’s architecture or with any of the permissions enabled in the following applications:
flatpak info --show-permissions org.mozilla.firefox
[Context]
shared=network;
sockets=wayland;pulseaudio;
filesystems=
persistent=.mozilla;
[Environment]
DICPATH=/usr/share/hunspell
flatpak info --show-permissions org.kde.haruna
[Context]
sockets=wayland;pulseaudio;
devices=dri;
filesystems=xdg-config/kdeglobals:ro;
flatpak info --show-permissions com.github.wwmm.easyeffects
[Context]
sockets=wayland;
devices=dri;
filesystems=xdg-run/pipewire-0:ro;
[Environment]
LADSPA_PATH=/app/lib/ladspa
LV2_PATH=/app/lib/lv2:/app/extensions/Plugins/lv2
All of these applications work exactly as intended (as far as I can tell in daily use) with the permissions outlined above.
This is on Fedora 42 KDE if that is useful information.