The sandbox runtime that ends the AI agent dilemma — agents run without restrictions, your host stays completely untouched.
One daemon, many sandboxes, unlimited agents
Everything your agents need. Nothing your host risks.
Every guarantee is enforced by the platform — not reliant on agent behavior
| Layer | Mechanism | Status |
|---|---|---|
| Host network | Each sandbox gets its own isolated Docker network. Cannot reach localhost, host services, or the local network. | blocked |
| Internet access | Agents freely download packages, call APIs, clone repos, and interact with the outside world. | open |
| Host filesystem | Zero access by default. Only explicitly declared mounts are allowed; the daemon rejects anything unsafe. | invisible |
| Credentials | Only daemon-defined shortcuts (SSH forwarding, gh CLI auth) can enter. Fixed rules — no arbitrary host path passthrough. | minimal |
| Cleanup | All runtime resources (containers, networks, filesystem state) fully removed on delete. No orphans, no leaks. | complete |
Codex and Claude Code both have sandboxes. Neither actually solves the dilemma.
| Codex danger-full-access |
Claude Code --dangerously-skip-permissions |
agents-sandbox | |
|---|---|---|---|
| git commit / push | ✓ Works | ✓ Works | ✓ Works |
| Install deps, build, test | ✓ Works | ✓ Works | ✓ Works |
| Approval prompts | ✗ None — all bypassed | ✗ None — all bypassed | ✓ None needed |
| Host filesystem | Fully read & writable | Fully read & writable | Invisible — declared mounts only |
| Other projects on machine | Readable & writable | Readable & writable | Invisible |
| Credential exposure | Inherits full host env | Inherits full host env | SSH agent & gh CLI only |
| Host network | Fully exposed | Fully exposed | Blocked — internet open |
| Blast radius of a bad command | Entire host machine | Entire host machine | Disposable sandbox only |
| Host safety | None | None | Full — host untouched |
Pull the runtime image and start sandboxing your agents in minutes
Built in the open, for everyone