So, the way I see it is: if XSS has to be uncrasheable, sandbox it.

Wrap it in something that's actually uncrasheable, and that will reload it unless XSS exits with code 0 or something

Or have a syscall to "freeze" the user (this is why Windows required Ctrl-Alt-Del to login - so that the login input was gatekept), but yeah, X11 is a mess

> that will reload it unless XSS exits with code 0 or something

Sort of what https://github.com/google/xsecurelock recommends doing.

Also, xsecurelock doesn't run the input and PAM auth in the same process as the lock, making input bugs (https://news.ycombinator.com/item?id=21224179) harmless as well.