<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[The Nix sandbox aims to provide a pure environment by isolating the build environment from the rest of the system.]]></title><description><![CDATA[<p>The Nix sandbox aims to provide a pure environment by isolating the build environment from the rest of the system. However, some impurities can still affect builds inside the sandbox and lead to reproducibility issues. One of them is the filesystem.</p><p>A common example is builds that implicitly depend on inode numbering or directory entry ordering. In some cases, you might even run into a filesystem bug: a build succeeds on one machine, but fails on another with a different filesystem.</p><p>To debug these issues, you can now use nix-buildon. It lets you swap out the filesystem underneath the Nix sandbox. By running the sandbox on disorderfs, you can get a deterministic, sorted, or reverse-sorted view of directory entries. This makes it easy to check whether a build depends on filesystem behavior that should not matter in the first place.</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://github.com/katexochen/nix-buildon" title="GitHub - katexochen/nix-buildon: Discover filesystem-based reproducibility issues by running the Nix sandbox on different filesystems">
<img src="https://opengraph.githubassets.com/a0532f884cc715589491a321e409790de3be5628bd4fdc3097fb4ca82292dbbf/katexochen/nix-buildon" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://github.com/katexochen/nix-buildon">
GitHub - katexochen/nix-buildon: Discover filesystem-based reproducibility issues by running the Nix sandbox on different filesystems
</a>
</h5>
<p class="card-text line-clamp-3">Discover filesystem-based reproducibility issues by running the Nix sandbox on different filesystems - katexochen/nix-buildon</p>
</div>
<a href="https://github.com/katexochen/nix-buildon" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://github.githubassets.com/favicons/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />



<p class="d-inline-block text-truncate mb-0">GitHub <span class="text-secondary">(github.com)</span></p>
</a>
</div></p><p>I created this at <a href="https://infosec.exchange/tags/OceanSprint" rel="tag">#<span>OceanSprint</span></a>. <img
      src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f30a.png?v=28325c671da"
      class="not-responsive emoji emoji-android emoji--ocean"
      style="height: 23px; width: auto; vertical-align: middle;"
      title="🌊"
      alt="🌊"
    /></p><p><a href="https://infosec.exchange/tags/Nix" rel="tag">#<span>Nix</span></a> <a href="https://infosec.exchange/tags/NixOS" rel="tag">#<span>NixOS</span></a> <a href="https://infosec.exchange/tags/ReproducibleBuilds" rel="tag">#<span>ReproducibleBuilds</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/05f37f05-c3be-4897-9a12-05189645fdec/the-nix-sandbox-aims-to-provide-a-pure-environment-by-isolating-the-build-environment-from-the-rest-of-the-system.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 20:51:23 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/05f37f05-c3be-4897-9a12-05189645fdec.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 18 Apr 2026 13:02:59 GMT</pubDate><ttl>60</ttl></channel></rss>