SYD-PATH(1) General Commands Manual SYD-PATH(1)

syd-path - Write Force sandboxing rules for binaries and list executables under PATH

syd-path [-a alg] [-heklpsw]

Write Force sandboxing rules for binaries under PATH.

If at least one of the various -e options is specified, list executables with specified information under PATH.

-a alg Hash algorithm to use (default: auto-detect best available).
Any algorithm listed in proc_crypto(5) with type ahash or shash may be used.
Use -a list to list available algorithms.
Use -a auto to auto-detect the best algorithm (default).
Examples: sha256, sha512, sha3-512, blake2b-256, md5, crc32c
-h Display help.
-k Use action kill (default).
-w Use action warn.
-l num Limit by number of entries.
-p path Specify alternative PATH.
-s Prefix rules with "/dev/syd/".
-e32 List 32-bit ELF executables under PATH (conflicts with -e64).
-e64 List 64-bit ELF executables under PATH (conflicts with -e32).
-ed List dynamically linked ELF executables under PATH (conflicts with -es).
-es List statically linked ELF executables under PATH (conflicts with -ed).
-ep List PIE executables under PATH (conflicts with -eP).
-eP List non-PIE executables under PATH (conflicts with -ep).
-ex List scripts under PATH.
-eX List binaries with executable stack under PATH.

This tool will skip any failure silently.

syd(1), syd(2), syd(5), syd-sum(1), proc_crypto(5)

syd homepage: https://sydbox.exherbo.org/

Maintained by Ali Polatel. Up-to-date sources can be found at https://gitlab.exherbo.org/sydbox/sydbox.git and bugs/patches can be submitted to https://gitlab.exherbo.org/groups/sydbox/-/issues. Discuss in #sydbox on Libera Chat or in #sydbox:mailstation.de on Matrix.

2026-04-25