zlacker

[parent] [thread] 5 comments
1. ushako+(OP)[view] [source] 2026-02-03 20:51:28
both Docker and bubblewrap are not secure sandboxes. the only way to have actually isolated sandboxes is by using VMs

disclaimer: i work on secure sandboxes at E2B

replies(3): >>senko+Z1 >>its-su+S8 >>gf000+Rj
2. senko+Z1[view] [source] 2026-02-03 20:59:24
>>ushako+(OP)
No disagreement from me. From the article:

> Bubblewrap and Docker are not hardened security isolation mechanisms, but that's okay with me.

Edit to add: my understanding is the major flaw in this approach is potential bugs in Linux kernel that would allow sandbox escape. Would appreciate your insight if there are some easier/more probable attack vectors.

3. its-su+S8[view] [source] 2026-02-03 21:36:53
>>ushako+(OP)
Do you have more information on how to set up such VMs?
replies(1): >>ushako+Ua
◧◩
4. ushako+Ua[view] [source] [discussion] 2026-02-03 21:46:37
>>its-su+S8
for personal use, many ways: Vargant, Docker Sandbox, NixOS VMs, Lima, OrbStack.

if you want multi-tenant: E2B (open-source, self-hosted)

replies(1): >>eikenb+Rw
5. gf000+Rj[view] [source] 2026-02-03 22:34:36
>>ushako+(OP)
What about cgroups? I know they are not exactly analogous, but to me that seems like a pretty decent solution.
◧◩◪
6. eikenb+Rw[view] [source] [discussion] 2026-02-03 23:45:32
>>ushako+Ua
Hashicorp has mostly abandoned Vagrant, so I'd avoid it.
[go to top]