Comment # 4 on bug 1208689 from
I'm done with the review.

There's one generated D-Bus Service running as root:
```
[D-BUS Service]
Name=org.kde.kded.inotify
Exec=/usr/libexec/kauth/kded-inotify-helper
User=root
```
This is only accessible with admin privileges.

Beyond this, there are 3 components:

- `helper/`: 
  - the aforementioned D-Bus service, running as root
  - requires admin permissions
  - includes code in `survey/`
- `survey/`: 
  - Crawls /proc
  - No obvious flaws, except that it's inherently prone to race
    conditions, but this does not matter in this case. The count
    does not have to be perfect to be useful.
- `kded/`:
  - module for KDED
  - exposes a user-accessible D-Bus method
    org.kde.kded5:/modules/inotify/refresh(), unprivileged 

All good.
I will proceed with the whitelisting.


You are receiving this mail because: