I am very paranoid about security, trying to push the limits. I am curious about nosuid because I think it is very cool that we can prevent files from executing with elevated permissions by setting it (removing a ton of attack surface). The problem is, now when I log in as root, there is literally nothing I can do to give privileges to user1 (root is user0, user1 is Muimi in this case, for example). I think run0 was DESIGNED to do this (*I might be wrong. It may have been designed to prevent slippery slopes when sudo is typed); however, the manual for run0 says run0 is a newer, safer version of sudo! It should allow us to elevate our privileges without the risks that are inherent with suid groupid (I worry about file execution through suid groupid allowing unwanted or arbitrary code to execute: here is the run0 manpage which says "no suid or groupid is used").
But I digress....
If run0 is not an option, is there any other option? Really, the only methods I could find that suggested solutions were by LLMs (and they usually are wrong with these advanced questions). They asked me to set up some fancy javascript stuff in polkit directories, which I tried seeing no harm, and of course it was a waste of time.
Problem behavior:
Launch terminal as user1. Type run0, and it should flash "AUTHENTICATION ERROR"
System info:
Debian 13 latest-LTS; MATE desktop; fresh install (nothing on the system other than what came with the dvd installer offline install); fully updated with apt update; 64gb ram, NVIDIA 16gb vram, AMD cpu, aurus pro mobo. I am trying to write some FOSS workaround, but I cannot seem to accomplish anything remotely similar to what I am trying to achieve without turning on suid, and I want to avoid that!
Expected behavior:
As root, I want to be able to change some file or permission somewhere that can cause User1 to be allowed to run commands using run0.