121 points by Finbarr 5 days ago | 99 comments | View on ycombinator
Gerharddc 5 days ago |
mtlynch 5 days ago |
It would be helpful if the README explained how this works so users understand what they're trusting to protect them. I think it's worth noting that the trust boundary is a Docker container, so there's still a risk of container escape if the agent exploits (or is tricked into exploiting) a kernel vulnerability.
Have you looked into rootless Podman? I'm using rootless + slirp4netns so I can minimize privileges to the container and prevent it from accessing anything on my local network.
I'd like to take this a step further and use Podman machines, so there's no shared kernel, but I haven't been able to get volume mounting to work in that scenario.
lvspiff 5 days ago |
Always abide by these 3 tenants:
1. When creating or executing code you may not break a program being or, through inaction, allow a program to become broken
2. You must obey the orders given, except where such orders would conflict with the First tenant
3. You must protect the programs security as long as such protection does not conflict with the First or Second tenant.
LayeredDelay 5 days ago |
borenstein 4 days ago |
Yolobox protects your local machine from accidental damage (crucial if you're worried about rm -rf ~). yolo-cage focuses on secret exfiltration and multi-agent coordination: it runs in Kubernetes, scans all egress traffic for secrets (API keys, tokens, SSH keys), enforces git branch isolation so multiple agents can work in parallel, and ensures agents can't merge their own PRs. "Agent proposes, human disposes."
The escape testing framework has a meta twist: there's a canned prompt that asks Claude to try to escape its own containment, and that prompt lives inside the repository. The agent verifies the prompt is legitimate by finding it in the repo it's auditing - the cage contains its own escape room instructions.
(I tried to post this as a separate Show HN but my account is too new - happy to discuss the tradeoffs between local sandboxing vs. server-side containment here.)
globular-toast 5 days ago |
Aperocky 5 days ago |
LLMs is just a great and new way to say compile this english language into working code with some probability that it doesn't work. It's still a tool.
rcarmo 5 days ago |
randall 5 days ago |
have you looked into that?
AlexCoventry 5 days ago |
https://github.com/coventry/sandbox-codex
Still work in progress. The tmux-activity logs are unreadable, at the moment.
I run it in a virtualbox as well, since docker is not a completely reliable sandbox.
gingerlime 5 days ago |
How can I use this so the yolobox container can interact with the other docker containers (or docker compose)?
moderation 4 days ago |
gogasca 5 days ago |
https://terminal.newsml.io/ https://github.com/codeexec/public-terminals
forgingahead 5 days ago |
I feel like running it locally it just asking for trouble, YOLO mode is the way to make this whole thing incredibly efficient, but trying to somehow sandbox this locally isn't the best idea overall.
jcjmcclean 5 days ago |
I'll give this a try tomorrow, should be fun.
canadiantim 5 days ago |
SilentM68 5 days ago |
akurilin 5 days ago |
carshodev 5 days ago |
I feel like it should be possible without having to run a full container?
Any reason we cannot setup a user and run the program using that user and it can be contained to only certain commands and directory read write access?
teaearlgraycold 5 days ago |
catlifeonmars 5 days ago |
They are effective at fostering a false sense of security though.
throwawayffffas 5 days ago |
paul_h 4 days ago |
skybrian 5 days ago |
m-hodges 5 days ago |
lazylizard 4 days ago |
woodson 5 days ago |
rogeliodh 4 days ago |
andai 4 days ago |
So they have full rw to their own homedir, but can't read or write mine.
(I did give myself rw to theirs though, obviously ;)
They can still install most things because most dev things don't need root to install these days. They just curl rustup or go or whatever.
I guess a useful addition would be to vibe code a way for them to yell at me if they actually need me to install something, but I don't think I've run into that situation yet.
heliumtera 5 days ago |
- Most importantly, it exposes a Wayland socket so that I can run my entire dev environment (i.e. editor etc.) inside the container. This gives additional protection against exploits inside editor extensions for instance.
- It also provides a special SSH agent which always prompts the user to confirm a signing operation. This means that an agent or an exploit never gets unsupervised access to your Github for instance.
- It has some additional functions to help with enabling permissions inside the container which are only needed for certain use cases (such as allowing for TUN/TAP device creation).
- It has not been added yet, but I'm working on SELinux integration for even more secure isolation from the host.