<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[TIL Docker v4.58+ have the &#96;sandbox&#96; subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can&#x27;t trust like ghidra or ida)]]></title><description><![CDATA[<p>TIL Docker v4.58+ have the `sandbox` subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can't trust like ghidra or ida)</p>]]></description><link>https://board.circlewithadot.net/topic/3d0d79a7-7dd7-4618-8108-5f41bdc3023f/til-docker-v4.58-have-the-sandbox-subcommand-to-run-commands-with-restricted-filesystem-access-ideal-for-running-coding-agents-in-yolo-mode-or-any-other-software-you-can-t-trust-like-ghidra-or-ida</link><generator>RSS for Node</generator><lastBuildDate>Mon, 06 Apr 2026 09:23:42 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/3d0d79a7-7dd7-4618-8108-5f41bdc3023f.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 23 Mar 2026 12:20:33 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to TIL Docker v4.58+ have the &#96;sandbox&#96; subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can&#x27;t trust like ghidra or ida) on Mon, 23 Mar 2026 14:31:31 GMT]]></title><description><![CDATA[<span><a href="/user/pancake%40infosec.exchange" rel="ugc">@<span>pancake</span></a></span> How about X11 socket sharing? <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /> <br /><a href="https://github.com/v-p-b/binaryninja-docker" rel="ugc">https://github.com/v-p-b/binaryninja-docker</a>]]></description><link>https://board.circlewithadot.net/post/https://infosec.place/objects/e405b3b7-52ab-4ad1-9cd8-a11d94bdc9a3</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.place/objects/e405b3b7-52ab-4ad1-9cd8-a11d94bdc9a3</guid><dc:creator><![CDATA[buherator@infosec.place]]></dc:creator><pubDate>Mon, 23 Mar 2026 14:31:31 GMT</pubDate></item><item><title><![CDATA[Reply to TIL Docker v4.58+ have the &#96;sandbox&#96; subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can&#x27;t trust like ghidra or ida) on Mon, 23 Mar 2026 13:42:14 GMT]]></title><description><![CDATA[<p>Jk. Docker sandbox only works for real programs. Aka the ones that run in a tty</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/pancake/statuses/116278777254721531</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/pancake/statuses/116278777254721531</guid><dc:creator><![CDATA[pancake@infosec.exchange]]></dc:creator><pubDate>Mon, 23 Mar 2026 13:42:14 GMT</pubDate></item><item><title><![CDATA[Reply to TIL Docker v4.58+ have the &#96;sandbox&#96; subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can&#x27;t trust like ghidra or ida) on Mon, 23 Mar 2026 12:57:32 GMT]]></title><description><![CDATA[<span><a href="/user/pancake%40infosec.exchange" rel="ugc">@<span>pancake</span></a></span> Thanks for the clarification!]]></description><link>https://board.circlewithadot.net/post/https://infosec.place/objects/48c34c21-d5df-4ce1-a2e5-a2f059183ed8</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.place/objects/48c34c21-d5df-4ce1-a2e5-a2f059183ed8</guid><dc:creator><![CDATA[buherator@infosec.place]]></dc:creator><pubDate>Mon, 23 Mar 2026 12:57:32 GMT</pubDate></item><item><title><![CDATA[Reply to TIL Docker v4.58+ have the &#96;sandbox&#96; subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can&#x27;t trust like ghidra or ida) on Mon, 23 Mar 2026 12:56:48 GMT]]></title><description><![CDATA[<p><span><a href="/user/buherator%40infosec.place">@<span>buherator</span></a></span> yes that would be the same if you run the agent inside a docker with a mouted volume. Docker sandbox afaik just makes it easier to use</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/pancake/statuses/116278598568532748</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/pancake/statuses/116278598568532748</guid><dc:creator><![CDATA[pancake@infosec.exchange]]></dc:creator><pubDate>Mon, 23 Mar 2026 12:56:48 GMT</pubDate></item><item><title><![CDATA[Reply to TIL Docker v4.58+ have the &#96;sandbox&#96; subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can&#x27;t trust like ghidra or ida) on Mon, 23 Mar 2026 12:44:45 GMT]]></title><description><![CDATA[<span><a href="/user/pancake%40infosec.exchange" rel="ugc">@<span>pancake</span></a></span> I think we are talking about different things (please provide a link or stg if I misunderstand). When I just launch claude it can and will write at random FS paths for example, because the process has the privileges to do so. Can it do the same if I launch it in a regular old container where the project directory is mounted (it will have access to everything inside the mount ofc but not my whole ~)?]]></description><link>https://board.circlewithadot.net/post/https://infosec.place/objects/ff844532-a26a-4f05-be88-8f478c674bb6</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.place/objects/ff844532-a26a-4f05-be88-8f478c674bb6</guid><dc:creator><![CDATA[buherator@infosec.place]]></dc:creator><pubDate>Mon, 23 Mar 2026 12:44:45 GMT</pubDate></item><item><title><![CDATA[Reply to TIL Docker v4.58+ have the &#96;sandbox&#96; subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can&#x27;t trust like ghidra or ida) on Mon, 23 Mar 2026 12:40:19 GMT]]></title><description><![CDATA[<p><span><a href="/user/buherator%40infosec.place">@<span>buherator</span></a></span> yep, escaping agent sandbox is a pretty common vuln and all agents are affected because there's literally no way to fix this than just add more checks when a escape is found. and even if you are requested to give permission to a directory, agents can write programs and execute without supervision or with hidden ways which makes it possible to access anything bypassing the classic checks.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/pancake/statuses/116278533777610057</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/pancake/statuses/116278533777610057</guid><dc:creator><![CDATA[pancake@infosec.exchange]]></dc:creator><pubDate>Mon, 23 Mar 2026 12:40:19 GMT</pubDate></item><item><title><![CDATA[Reply to TIL Docker v4.58+ have the &#96;sandbox&#96; subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can&#x27;t trust like ghidra or ida) on Mon, 23 Mar 2026 12:37:55 GMT]]></title><description><![CDATA[<span><a href="/user/pancake%40infosec.exchange" rel="ugc">@<span>pancake</span></a></span> I get that this is a stronger isolation layer, but why is that necessary? Do agents randomly perform container escapes?<br /><br />Simplicity is definitely a plus, but that wouldn't require VMs either.]]></description><link>https://board.circlewithadot.net/post/https://infosec.place/objects/031603e5-9c09-44d3-91c3-ed0f2b7ae081</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.place/objects/031603e5-9c09-44d3-91c3-ed0f2b7ae081</guid><dc:creator><![CDATA[buherator@infosec.place]]></dc:creator><pubDate>Mon, 23 Mar 2026 12:37:55 GMT</pubDate></item><item><title><![CDATA[Reply to TIL Docker v4.58+ have the &#96;sandbox&#96; subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can&#x27;t trust like ghidra or ida) on Mon, 23 Mar 2026 12:27:57 GMT]]></title><description><![CDATA[<p><span><a href="/user/buherator%40infosec.place">@<span>buherator</span></a></span> it creates a VM for each program you run, the program inside can’t see your system processes and there, and probably the main positive point here is simplicity to use and manage</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/pancake/statuses/116278485125110413</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/pancake/statuses/116278485125110413</guid><dc:creator><![CDATA[pancake@infosec.exchange]]></dc:creator><pubDate>Mon, 23 Mar 2026 12:27:57 GMT</pubDate></item><item><title><![CDATA[Reply to TIL Docker v4.58+ have the &#96;sandbox&#96; subcommand to run commands with restricted filesystem access, ideal for running coding agents in yolo mode (or any other software you can&#x27;t trust like ghidra or ida) on Mon, 23 Mar 2026 12:23:10 GMT]]></title><description><![CDATA[<span><a href="/user/pancake%40infosec.exchange" rel="ugc">@<span>pancake</span></a></span> How is this different from simply bind mounting your project dir?]]></description><link>https://board.circlewithadot.net/post/https://infosec.place/objects/32aa04fa-9e18-45e5-badc-b95f06892d70</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.place/objects/32aa04fa-9e18-45e5-badc-b95f06892d70</guid><dc:creator><![CDATA[buherator@infosec.place]]></dc:creator><pubDate>Mon, 23 Mar 2026 12:23:10 GMT</pubDate></item></channel></rss>