security.bsd.see_other_uids=0
security.bsd.see_other_gids=0
security.bsd.see_jail_proc=0
security.bsd.unprivileged_read_msgbuf=0
security.bsd.unprivileged_proc_debug=0
kern.randompid=1
truss(1):None of those look like they'd have anything to do with truss, but maybe.
DESCRIPTION
The truss utility traces the system calls called by the specified process
or program. Output is to the specified output file, or standard error by
default. It does this by stopping and restarting the process being
monitored via ptrace(2).
DESCRIPTION
The ptrace() system call provides tracing and debugging facilities. It
allows one process (the tracing process) to control another (the traced
process). The tracing process must first attach to the traced process,
and then issue a series of ptrace() system calls to control the execution
of the process, as well as access process memory and register state.
% sysctl -d security.bsd.unprivileged_proc_debug
security.bsd.unprivileged_proc_debug: Unprivileged processes may use process debugging facilities
security.bsd.unprivileged_proc_debug=0
security.bsd.unprivileged_proc_debug=1
The security drawback is that any user is able to run debug commands. While you can't use it to debug processes not owned by you it can still provide a lot of inside information. For your home/hobby machine this probably doesn't matter much but for production systems you'll want to turn that off (nobody is going to debug an active production system any way).Do you know if there's any security drawback to leaving it as