Dashboard
Executions
0
Blocked
0
Bytes
0
Uptime
0s
Rate/min
0
Agents
0
Profile
strict
Isolation
basic
ProfileCPU:5s Mem:64MB
Connected Agents
| Agent | Execs | Blocked | Bytes | Rate | Tokens In | Tokens Out | Budget | Model | Last Active |
|---|
Terminal
$
Audit Log
No entries yet.
Connect Your Agents
1. Your Sandbox Credentials
Endpoint
loading...Usernameloading...Password********👁2. Test Connection
Verify your agents can reach this sandbox.
3. Integrate
Replace your subprocess/exec calls with the sandbox. Pick your stack:
loading...
Active Agents
Agents auto-register on first request via X-Agent header. Click Set to configure budget.
| Agent | Model | Execs | Blocked | Tokens | Budget |
|---|
API Endpoints
| Method | Endpoint | Description |
|---|---|---|
| POST | /api/exec | Execute sandboxed command |
| GET | /api/health | Sandbox status and metrics |
| GET | /api/agents | Per-agent metrics and tokens |
| GET | /api/audit | Audit log (?agent= filter) |
| GET | /api/policy | Current blacklist/whitelist |
| POST | /api/profile | Switch security profile |
| POST | /api/budget | Set per-agent token budget |
| POST | /api/policy | Add/remove policy rules |
| POST | /api/policy/reload | Reload policy from file |
| DELETE | /api/sandbox | Reset sandbox counters |
Policies
Test a Command
Check if a command would be allowed or blocked without executing it.
Blacklist
Commands matching these patterns are blocked.
Whitelist (Strict Mode)
Only these commands are allowed in strict profile.
Token Budgets
Set a maximum token budget per agent. When exceeded, commands return HTTP 429.
| Agent | Tokens Used | Budget | Usage |
|---|
Security
Security Profile
Changes take effect immediately.
Strict: Whitelist only. Agent can only run allowed commands.
Moderate: Blacklist. Everything except blocked patterns.
Permissive: Audit only. All commands logged.
6-Layer Defense
| Layer | Mechanism | What it does |
|---|---|---|
| 1 | Command Blacklist | Pattern matching before fork (rm -rf, wget, curl, etc.) |
| 2 | CLONE_NEWNET | Empty network namespace. socket() does not exist. |
| 3 | chroot Jail | Filesystem isolated. /etc, /home, /root invisible. |
| 4 | setrlimit | CPU, RAM, processes, file size capped per execution. |
| 5 | NO_NEW_PRIVS | Blocks SUID escalation. No privilege elevation. |
| 6 | seccomp-bpf | 17 syscalls blocked at kernel: socket, connect, ptrace, reboot... |
Resource Limits
CPU Timeout5sMemory Limit64MBCommand Timeout5000msMax Processes5Max File Size10MBMax Open Files32
Settings
Change Password
Update dashboard credentials. Takes effect immediately.
Rate Limiting
Maximum requests per minute per agent.
req/min per agent
Command Timeout
Maximum execution time per command before kill.
ms
Usage Summary
Total Executions0
Total Tokens0
Active Agents0
Export Audit Log
Download all audit entries as JSON.
Reset Sandbox
Clear all counters, agents, and audit log. Cannot be undone.