I'm done with the review. There's one generated D-Bus Service running as root: ``` [D-BUS Service] Name=org.kde.kded.inotify Exec=/usr/libexec/kauth/kded-inotify-helper User=root ``` This is only accessible with admin privileges. Beyond this, there are 3 components: - `helper/`: - the aforementioned D-Bus service, running as root - requires admin permissions - includes code in `survey/` - `survey/`: - Crawls /proc - No obvious flaws, except that it's inherently prone to race conditions, but this does not matter in this case. The count does not have to be perfect to be useful. - `kded/`: - module for KDED - exposes a user-accessible D-Bus method org.kde.kded5:/modules/inotify/refresh(), unprivileged All good. I will proceed with the whitelisting.