Skills2026年5月1日·1 分钟阅读

microsandbox — Secure Local Sandboxes for AI Agents

microsandbox provides lightweight, programmable sandboxes that let AI agents execute code safely on your own machine, with strong isolation and support for multiple runtimes.

Agent 就绪

这个资产可以被 Agent 直接读取和安装

TokRepo 同时提供通用 CLI 命令、安装契约、metadata JSON、按适配器生成的安装计划和原始内容链接,方便 Agent 判断适配度、风险和下一步动作。

Needs Confirmation · 64/100策略:需确认
Agent 入口
任意 MCP/CLI Agent
类型
Skill
安装
Single
信任
信任等级:Established
入口
microsandbox Overview
通用 CLI 安装命令
npx tokrepo install bc067d8e-4557-11f1-9bc6-00163e2b0d79

Introduction

microsandbox gives AI agents a safe place to execute arbitrary code on your local machine. Each sandbox is an isolated micro-VM with its own filesystem and network stack, providing defense-in-depth without the overhead of full virtual machines or the security gaps of plain containers.

What microsandbox Does

  • Spins up lightweight micro-VMs in milliseconds for executing untrusted code
  • Provides SDKs for Node.js, Python, and Rust to programmatically create and manage sandboxes
  • Supports filesystem mounts for sharing data between the host and sandbox
  • Offers network isolation with configurable policies per sandbox
  • Exposes an HTTP API and CLI for integration with any AI agent framework

Architecture Overview

microsandbox uses a Rust-based server that manages sandbox lifecycles through lightweight virtualization. Each sandbox runs in its own isolated environment with a minimal Linux userspace. The server exposes a local HTTP API that agent frameworks call to create sandboxes, execute commands, and retrieve results. Resource limits (CPU, memory, time) are enforced at the hypervisor level.

Self-Hosting & Configuration

  • Install with the one-line installer or build from source with cargo build --release
  • The server runs as a background daemon listening on localhost by default
  • Configure resource limits per sandbox in ~/.config/microsandbox/config.toml
  • Supports macOS and Linux; Windows support is under development
  • No cloud dependency — all execution happens locally on your hardware

Key Features

  • Millisecond sandbox startup for interactive agent workflows
  • Strong isolation via micro-VM technology, not just containers
  • Multi-language SDKs for TypeScript, Python, and Rust
  • Configurable resource limits and network policies
  • Open source under Apache 2.0 license

Comparison with Similar Tools

  • E2B — cloud-hosted sandboxes; microsandbox runs entirely on your local machine
  • Daytona — cloud dev environments; microsandbox focuses on ephemeral code execution
  • Docker — container-based isolation with shared kernel; microsandbox provides VM-level separation
  • Firecracker — low-level microVM manager; microsandbox adds agent-friendly SDKs and API

FAQ

Q: How is this different from running code in Docker? A: microsandbox uses micro-VM isolation which provides stronger security boundaries than shared-kernel containers.

Q: What languages can run inside a sandbox? A: Any language available in the sandbox image — Python, Node.js, Go, Rust, and others.

Q: Does it require root privileges? A: The server needs elevated privileges for VM management. Sandbox users do not.

Q: Can I mount host directories into the sandbox? A: Yes. Configure filesystem mounts in the sandbox creation request with read-only or read-write access.

Sources

讨论

登录后参与讨论。
还没有评论,来写第一条吧。

相关资产