7 comments

  • CuriouslyC1 minute ago
    Sandbox isolation is only slightly important, you don't need to make it fancy, just a plain old VM. The really important thing is how you control capabilities you give for the agent to act on your behalf.
  • simonw1 hour ago
    I disagree with this section about WebAssembly:<p>&gt; But the practical limitation is language support. You cannot run arbitrary Python scripts in WASM today without compiling the Python interpreter itself to WASM along with all its C extensions. For sandboxing arbitrary code in arbitrary languages, WASM is not yet viable.<p>There are several versions of the Python interpreter that are compiled to WASM already - Pyodide has one, and WASM is a &quot;Tier 2&quot; supported target for CPython: <a href="https:&#x2F;&#x2F;peps.python.org&#x2F;pep-0011&#x2F;#tier-2" rel="nofollow">https:&#x2F;&#x2F;peps.python.org&#x2F;pep-0011&#x2F;#tier-2</a> - unofficial builds here: <a href="https:&#x2F;&#x2F;github.com&#x2F;brettcannon&#x2F;cpython-wasi-build&#x2F;releases" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;brettcannon&#x2F;cpython-wasi-build&#x2F;releases</a><p>Likewise I&#x27;ve experimented with running various JavaScript interpreters compiled to WASM, the most popular of those is probably QuickJS. Here&#x27;s one of my many demos: <a href="https:&#x2F;&#x2F;tools.simonwillison.net&#x2F;quickjs" rel="nofollow">https:&#x2F;&#x2F;tools.simonwillison.net&#x2F;quickjs</a> (I have one for MicroQuickJS too <a href="https:&#x2F;&#x2F;tools.simonwillison.net&#x2F;microquickjs" rel="nofollow">https:&#x2F;&#x2F;tools.simonwillison.net&#x2F;microquickjs</a> )<p>So don&#x27;t rule out WASM as a target for running non-compiled languages, it can work pretty well!
    • syrusakbary44 minutes ago
      I also disagree with that.<p>Wasmer can run now Python server-side without any restrictions (including gevent, SQLAlchemy and native modules!) [1] [2]<p>Also, cool things are coming on the JS land running on Wasmer :)<p>[1] <a href="https:&#x2F;&#x2F;wasmer.io&#x2F;posts&#x2F;greenlet-support-python-wasm" rel="nofollow">https:&#x2F;&#x2F;wasmer.io&#x2F;posts&#x2F;greenlet-support-python-wasm</a><p>[2] <a href="https:&#x2F;&#x2F;wasmer.io&#x2F;posts&#x2F;python-on-the-edge-powered-by-webassembly" rel="nofollow">https:&#x2F;&#x2F;wasmer.io&#x2F;posts&#x2F;python-on-the-edge-powered-by-webass...</a>
      • shayonj41 minutes ago
        Wasmer looks v cool. I must check it out
    • shayonj47 minutes ago
      That is a good call out and I missed to consider the options you pointed. When I am back on keyboard I will add an updated note with a link to your comment. Thank you!
  • pash53 minutes ago
    OK, let’s survey how everybody is sandboxing their AI coding agents in early 2026.<p>What I’ve seen suggests the most common answers are (a) “containers” and (b) “YOLO!” (maybe adding, “Please play nice, agent.”).<p>One approach that I’m about to try is Sandvault [0] (macOS only), which uses the good old Unix user system together with some added precautions. Basically, give an agent its own unprivileged user account and interact with it via sudo, SSH, and shared directories.<p>0. <a href="https:&#x2F;&#x2F;github.com&#x2F;webcoyote&#x2F;sandvault" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;webcoyote&#x2F;sandvault</a>
    • ramoz6 minutes ago
      Mac Mini + docker for openclaw. Mac Mini is nice because I didnt want to deploy on my local day-to-day machine, otherwise im aware it&#x27;s not a true security mechanism for an integrated claw.<p>Claude Code local - nothing.<p>Claude Code remote - i just use anthropic&#x27;s web service. no desire to send my data or use anyone&#x27;s third party remote sandbox. I would deploy my own before I did that.
    • stefans15 minutes ago
      Looked into Apples container framework first (for proper isolation) but switched to Docker sandboxes since they switched to mircoVMs too: <a href="https:&#x2F;&#x2F;docs.docker.com&#x2F;ai&#x2F;sandboxes&#x2F;#why-use-docker-sandboxes" rel="nofollow">https:&#x2F;&#x2F;docs.docker.com&#x2F;ai&#x2F;sandboxes&#x2F;#why-use-docker-sandbox...</a>
    • simonw35 minutes ago
      I&#x27;m mainly addressing sandboxing by running stuff in Claude Code for web, at which point it&#x27;s Anthropic&#x27;s problem if they have a sandbox leak, not mine.<p>It helps that most of my projects are open source so I don&#x27;t need to worry about prompt injection code stealing vulnerabilities. That way the worst that can happen would be an attack adding a vulnerability to my code that I don&#x27;t spot when I review the PR.<p>And turning off outbound networking should protect against code stealing too... but I allow access to everything because I don&#x27;t need to worry about code stealing and that way Claude can install things and run benchmarks and generally do all sorts of other useful bits and pieces.
  • mcfig49 minutes ago
    I appreciate the details in this, but I also notice it is very machine-focused. When a user wants to sandbox an AI agent, they don’t just want their local .ssh keys protected. They also want to be able to control access to a lot of off-machine resources - e.g. allowing the agent to read github issues and sometimes also make some kinds of changes.
  • int0x2927 minutes ago
    Its worth pointing out another boundary: speculative execution. If sensitive data is in process memory with a WASM VM it can be read even if the VM doesn&#x27;t expose it. This is also true of multiple WASM VMs running for different parties. For WASM isolation to work the VM needs to be in a seperate process
  • grouchypumpkin23 minutes ago
    QubesOS was built to give sandboxes kernel isolation via a hypervisor.<p>It’s not surprising that most people don’t know about it, because QubesOS as a daily driver can be painful. But with some improvements, I think it’s the right way to do it.
  • diacritical21 minutes ago
    [dead]