Ask HN: Why are so many rolling out their own AI/LLM agent sandboxing solution?
Posted by ATechGuy 3 days ago
Seeing a lot of people running coding agents (Claude Code, etc.) in custom sandboxes Docker/VMs, firejail/bubblewrap, scripts that gate file or network access.
Curious to know what's missing that makes people DIY this? And what would a "good enough" standard look like?
Comments
Comment by varshith17 2 days ago
Comment by ATechGuy 1 day ago
This exists today in OSes in form of discretionary/mandatory permissions (e.g., SELinux, AppArmor, LandLocked).
Comment by verdverm 1 day ago
Comment by verdverm 2 days ago
To me, OCI seems the best foundation to build on. It has the features, is widely disseminated, and we have a lot of practice and tooling already
Comment by verdverm 3 days ago
Once started down this path, I knew I was going to need something for isolated exec envs. I ended up building something I think is quite awesome on Dagger. Let's me run in containers without running containers, can get a diff or rewind history, can persist and share wvia any OCI registry.
So on one hand, I needed something and chose a technology that would offer me interesting possibilities, and on the other I wanted to have features I don't expect the likes of Microsoft to deliver with Copilot, only one of which is my sandbox setup.
I'm not sure I would call it rolling my own completely, I'm building on established technology (OCI, OCR)
I don't expect a standard to arise, OCI is already widely adopted and makes sense, but there are other popular techs and there will be a ton of reimplementations by another name/claim. The other half of this is that AI providers are likely to want to run and charge money for this, I personally expect more attempts at vendor lock in in this space. In example, Anthropic bought Bun and I anticipate some product to come of this, isolation and/or canvas related
Comment by ATechGuy 3 days ago
Comment by verdverm 3 days ago
Go look at what dagger provides over those technologies as a basis for advanced agent env capabilities. I use it for more than just sandboxing with my agent
I would also point out sandboxing is just one feature, that is approaching required status, for an agentic framework and unlikely to be an independent product or solution
Comment by kaffekaka 2 days ago
It simply feels as if there is no de facto standard yet (there surely will be).
Comment by verdverm 20 hours ago
I'm building on OCI (via Dagger), so you are in good company, if I may say so
Comment by aristofun 1 day ago
If you cut network and files for Claude, for example, how is it even going to do the useful work?
Comment by hahahahhaah 3 hours ago
For files it has an isolated file system. That can have a git clone.
Comment by rvz 3 days ago
The question is how easy is it to bypass these DIY 'sandboxes'?
As long as there is a full OS running, you are one libc function away from a sandbox escape.
Comment by ATechGuy 3 days ago
Does this mean, all software in the world is just one function away from escape?
Comment by sargstuff 3 days ago
Running software is insecure the moment the electrical switch is on / start checking out shrodingers box. Although, reverse shrodingers cat might be more accurate. aka can escape the box if someone peaks from outside the box.