Passing "--disable-chroot" to guix-daemon makes it possible for the build users to be taken over by anybody who can start a build: they need only cause a builder to put a setuid binary in /tmp. That being said, there are some situations where it currently can't be avoided, like on Hurd. It would also probably be good to have the ability to harden a guix daemon in general by restricting access to it. For example, there's no reason that the ntpd user needs access to the guix daemon (note that this is distinct from access to the *store*, which is of course always world-readable). The attached patch implements that restriction for users of guix-service-type by limiting access to /var/guix/daemon-socket in accordance with the user-supplied permissions, user, and group. Example usage: ------------------------------------ ;; Limit access to the guix-daemon socket to members of the "users" ;; group (modify-services %desktop-services (guix-service-type config => (guix-configuration (inherit config) (socket-directory-perms #o750) (socket-directory-group "users")))) ------------------------------------ - reepca