zlacker

[parent] [thread] 9 comments
1. ashish+(OP)[view] [source] 2026-01-13 05:29:06
6 months back I started dockerizing my setup after multiple npm vulnerabilities.

Then I wrote a small tool[1] to streamline my sandboxing.

Now, I run agents inside it for keeping my non-working-directory files safe.

For some tools like markdown linter, I run them without network access as well.

1- https://github.com/ashishb/amazing-sandbox

replies(2): >>nullis+71 >>Gerhar+9a4
2. nullis+71[view] [source] 2026-01-13 05:43:04
>>ashish+(OP)
This looks awesome! Do you have a mental process you run through to determine what gets run in the sandbox, or is it your default mode for all tools?
replies(1): >>ashish+l5
◧◩
3. ashish+l5[view] [source] [discussion] 2026-01-13 06:37:48
>>nullis+71
> This looks awesome! Do you have a mental process you run through to determine what gets run in the sandbox, or is it your default mode for all tools?

Here's what I use it for right now

- yarn - npm - pnpm - mdl - Ruby-based Markdown linter - fastlane - Ruby-based mobile app release tool by Google - Claude Code - Gemini CLI

Over time, my goal is to run all CLI-based tools that only need access to the current directory (and not parent directories) via this.

replies(1): >>tapete+id4
4. Gerhar+9a4[view] [source] 2026-01-14 08:13:20
>>ashish+(OP)
Very nice! Quite a coincidence, but the NPM disaster also prompted me to build litterbox.work as a possible solution. It is a very different approach though.
replies(2): >>ashish+kc4 >>tapete+ld4
◧◩
5. ashish+kc4[view] [source] [discussion] 2026-01-14 08:34:31
>>Gerhar+9a4
Interesting project.

This won't work on Mac, right?

replies(2): >>tapete+fd4 >>Gerhar+Te4
◧◩◪
6. tapete+fd4[view] [source] [discussion] 2026-01-14 08:44:16
>>ashish+kc4
Of course not. But it is not needed, as Mac users are not interested in data safety.
◧◩◪
7. tapete+id4[view] [source] [discussion] 2026-01-14 08:44:41
>>ashish+l5
Why not just use the standard Linux tool bubblewrap?
◧◩
8. tapete+ld4[view] [source] [discussion] 2026-01-14 08:44:51
>>Gerhar+9a4
Why not just use the standard Linux tool bubblewrap?
replies(1): >>Gerhar+He4
◧◩◪
9. Gerhar+He4[view] [source] [discussion] 2026-01-14 08:58:53
>>tapete+ld4
The main reason is that in addition to sandboxing, I also wanted something similar to dev-containers where I can have a reproducible development environment. I guess that can also be achieved with Bubblewrap, but when you want to run containers anyway, it seems silly to not just use Podman.
◧◩◪
10. Gerhar+Te4[view] [source] [discussion] 2026-01-14 09:00:32
>>ashish+kc4
Unfortunately not since it is very much designed for Linux. I imagine it should work fine inside a Linux VM on Mac though.
[go to top]