The config server exploit scanner for cPanel warns us about world writeable directories. I think these directory permissions must be secure, but just wanted to double check. Is this correct/secure directory permissions for cagefs?
Code:
# Symlink to [/var/run/postgres/.s.PGSQL.5432]: /home/adrenali/.cagefs/tmp/.s.PGSQL.5432 # Symlink to [/var/lib/mysql/mysql.sock]: /home/adrenali/.cagefs/tmp/mysql.sock # World writeable directory: /home/adrenali/.cagefs/var/cache # World writeable directory: /home/adrenali/.cagefs/var/cache/php-eaccelerator # World writeable directory: /home/adrenali/.cagefs/var/run/screen # Symlink to [/var/run/postgres/.s.PGSQL.5432]: /home/adrenali/.cagefs.tmp/.s.PGSQL.5432
Comment