http://bugzilla.opensuse.org/show_bug.cgi?id=1208689 http://bugzilla.opensuse.org/show_bug.cgi?id=1208689#c3 --- Comment #3 from Wolfgang Frisch <wolfgang.frisch@suse.com> --- I'm done with the review. There's one generated D-Bus Service running as root: ``` [D-BUS Service] Name=org.kde.kded.inotify Exec=/usr/libexec/kauth/kded-inotify-helper User=root ``` This is only accessible with admin privileges. Beyond this, there are 3 components: - `helper/`: - the aforementioned D-Bus service, running as root - requires admin permissions - includes code in `survey/` - `survey/`: - Crawls /proc - No obvious flaws, except that it's inherently prone to race conditions, but this does not matter in this case. The count does not have to be perfect to be useful. - `kded/`: - module for KDED - exposes a user-accessible D-Bus method org.kde.kded5:/modules/inotify/refresh(), unprivileged Apart from that there's an unprivileged kded module. All good. I will proceed with the whitelisting. -- You are receiving this mail because: You are on the CC list for the bug.