Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. TIL Docker v4.58+ have the `sandbox` subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can't trust like ghidra or ida)

TIL Docker v4.58+ have the `sandbox` subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can't trust like ghidra or ida)

Scheduled Pinned Locked Moved Uncategorized
10 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • pancake@infosec.exchangeP This user is from outside of this forum
    pancake@infosec.exchangeP This user is from outside of this forum
    pancake@infosec.exchange
    wrote last edited by
    #1

    TIL Docker v4.58+ have the `sandbox` subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can't trust like ghidra or ida)

    buherator@infosec.placeB pancake@infosec.exchangeP 2 Replies Last reply
    0
    • pancake@infosec.exchangeP pancake@infosec.exchange

      TIL Docker v4.58+ have the `sandbox` subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can't trust like ghidra or ida)

      buherator@infosec.placeB This user is from outside of this forum
      buherator@infosec.placeB This user is from outside of this forum
      buherator@infosec.place
      wrote last edited by
      #2
      @pancake How is this different from simply bind mounting your project dir?
      pancake@infosec.exchangeP 1 Reply Last reply
      0
      • buherator@infosec.placeB buherator@infosec.place
        @pancake How is this different from simply bind mounting your project dir?
        pancake@infosec.exchangeP This user is from outside of this forum
        pancake@infosec.exchangeP This user is from outside of this forum
        pancake@infosec.exchange
        wrote last edited by
        #3

        @buherator it creates a VM for each program you run, the program inside can’t see your system processes and there, and probably the main positive point here is simplicity to use and manage

        buherator@infosec.placeB 1 Reply Last reply
        0
        • pancake@infosec.exchangeP pancake@infosec.exchange

          @buherator it creates a VM for each program you run, the program inside can’t see your system processes and there, and probably the main positive point here is simplicity to use and manage

          buherator@infosec.placeB This user is from outside of this forum
          buherator@infosec.placeB This user is from outside of this forum
          buherator@infosec.place
          wrote last edited by
          #4
          @pancake I get that this is a stronger isolation layer, but why is that necessary? Do agents randomly perform container escapes?

          Simplicity is definitely a plus, but that wouldn't require VMs either.
          pancake@infosec.exchangeP 1 Reply Last reply
          0
          • buherator@infosec.placeB buherator@infosec.place
            @pancake I get that this is a stronger isolation layer, but why is that necessary? Do agents randomly perform container escapes?

            Simplicity is definitely a plus, but that wouldn't require VMs either.
            pancake@infosec.exchangeP This user is from outside of this forum
            pancake@infosec.exchangeP This user is from outside of this forum
            pancake@infosec.exchange
            wrote last edited by
            #5

            @buherator yep, escaping agent sandbox is a pretty common vuln and all agents are affected because there's literally no way to fix this than just add more checks when a escape is found. and even if you are requested to give permission to a directory, agents can write programs and execute without supervision or with hidden ways which makes it possible to access anything bypassing the classic checks.

            buherator@infosec.placeB 1 Reply Last reply
            0
            • pancake@infosec.exchangeP pancake@infosec.exchange

              @buherator yep, escaping agent sandbox is a pretty common vuln and all agents are affected because there's literally no way to fix this than just add more checks when a escape is found. and even if you are requested to give permission to a directory, agents can write programs and execute without supervision or with hidden ways which makes it possible to access anything bypassing the classic checks.

              buherator@infosec.placeB This user is from outside of this forum
              buherator@infosec.placeB This user is from outside of this forum
              buherator@infosec.place
              wrote last edited by
              #6
              @pancake I think we are talking about different things (please provide a link or stg if I misunderstand). When I just launch claude it can and will write at random FS paths for example, because the process has the privileges to do so. Can it do the same if I launch it in a regular old container where the project directory is mounted (it will have access to everything inside the mount ofc but not my whole ~)?
              pancake@infosec.exchangeP 1 Reply Last reply
              0
              • buherator@infosec.placeB buherator@infosec.place
                @pancake I think we are talking about different things (please provide a link or stg if I misunderstand). When I just launch claude it can and will write at random FS paths for example, because the process has the privileges to do so. Can it do the same if I launch it in a regular old container where the project directory is mounted (it will have access to everything inside the mount ofc but not my whole ~)?
                pancake@infosec.exchangeP This user is from outside of this forum
                pancake@infosec.exchangeP This user is from outside of this forum
                pancake@infosec.exchange
                wrote last edited by
                #7

                @buherator yes that would be the same if you run the agent inside a docker with a mouted volume. Docker sandbox afaik just makes it easier to use

                buherator@infosec.placeB 1 Reply Last reply
                0
                • pancake@infosec.exchangeP pancake@infosec.exchange

                  @buherator yes that would be the same if you run the agent inside a docker with a mouted volume. Docker sandbox afaik just makes it easier to use

                  buherator@infosec.placeB This user is from outside of this forum
                  buherator@infosec.placeB This user is from outside of this forum
                  buherator@infosec.place
                  wrote last edited by
                  #8
                  @pancake Thanks for the clarification!
                  1 Reply Last reply
                  0
                  • pancake@infosec.exchangeP pancake@infosec.exchange

                    TIL Docker v4.58+ have the `sandbox` subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can't trust like ghidra or ida)

                    pancake@infosec.exchangeP This user is from outside of this forum
                    pancake@infosec.exchangeP This user is from outside of this forum
                    pancake@infosec.exchange
                    wrote last edited by
                    #9

                    Jk. Docker sandbox only works for real programs. Aka the ones that run in a tty

                    buherator@infosec.placeB 1 Reply Last reply
                    0
                    • pancake@infosec.exchangeP pancake@infosec.exchange

                      Jk. Docker sandbox only works for real programs. Aka the ones that run in a tty

                      buherator@infosec.placeB This user is from outside of this forum
                      buherator@infosec.placeB This user is from outside of this forum
                      buherator@infosec.place
                      wrote last edited by
                      #10
                      @pancake How about X11 socket sharing? 🙂
                      https://github.com/v-p-b/binaryninja-docker
                      1 Reply Last reply
                      1
                      0
                      • R relay@relay.infosec.exchange shared this topic
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups