//! Process-level secret-exposure hardening.
//!
//! `set_non_dumpable()` calls `prctl(PR_SET_DUMPABLE, 0)` (Linux), which:
//! - makes `/proc/$PID/` owned by root + unreadable to OTHER non-root UIDs
//! (so other users cannot read `/proc/$PID/cmdline` to harvest a secret
//! passed inline on argv), and
//! - disables core dumps (so a secret on argv/heap won't land in a core file).
//!
//! It does NOT hide cmdline from the SAME UID (a same-UID attacker already has
//! ptrace / `/proc/$PID/mem` access to the live process) — that residual is
//! accepted; this is the reliable, non-fragile companion to the `--*-stdin`
//! argv-leakage advisories. Best-effort: a `prctl` failure is ignored.
/// Deny other-UID `/proc/$PID` reads + core dumps for this process.
/// Linux-only; a no-op on other platforms.