Cette page est affichée en anglais. Une traduction française est en cours.
ScriptsMay 11, 2026·2 min de lecture

Agent Sandbox — Run Agents Safely on Kubernetes

Agent Sandbox provides Kubernetes-first guardrails for agent workloads: resource limits, isolation, and repeatable environments so failures stay contained.

Prêt pour agents

Cet actif peut être lu et installé directement par les agents

TokRepo expose une commande CLI universelle, un contrat d'installation, le metadata JSON, un plan selon l'adaptateur et le contenu raw pour aider les agents à juger l'adaptation, le risque et les prochaines actions.

Stage only · 29/100Stage only
Surface agent
Tout agent MCP/CLI
Type
Script
Installation
Single
Confiance
Confiance : Established
Point d'entrée
README.md
Commande CLI universelle
npx tokrepo install 3f94c7c7-7f5e-4e7e-8a42-d3c4fd46eaff
Introduction

Agent Sandbox provides Kubernetes-first guardrails for agent workloads: resource limits, isolation, and repeatable environments so failures stay contained.

  • Best for: Teams running untrusted agent code who need isolation, quotas, and an auditable execution surface
  • Works with: Kubernetes clusters + CI; pair with policy-as-code and least-privilege service accounts
  • Setup time: 30 minutes

Practical Notes

  • Setup time ~30 minutes (apply manifests + run one sandboxed job)
  • Three hard checks: limits enforced, egress scoped, run logs retained
  • GitHub stars + forks (verified): see Source & Thanks

Agents get dangerous when they can run arbitrary code with long-lived credentials. A Kubernetes sandbox lets you bound blast radius: small quotas, short-lived identities, and auditable logs. Use it to make ‘agent execution’ an infrastructure primitive rather than an ad-hoc local script.

FAQ

Q: Do I need Kubernetes for agents? A: Not always—but it’s a strong default if you must isolate untrusted execution.

Q: What’s the first guardrail to add? A: Resource limits + restricted service accounts; then add egress controls.

Q: How do I make runs reproducible? A: Pin images/versions and treat manifests as code reviewed like any PR.

🙏

Source et remerciements

Source: https://github.com/kubernetes-sigs/agent-sandbox > License: Apache-2.0 > GitHub stars: 2,125 · forks: 253

Fil de discussion

Connectez-vous pour rejoindre la discussion.
Aucun commentaire pour l'instant. Soyez le premier à partager votre avis.

Actifs similaires