Discover and explore top open-source AI tools and projects—updated daily.
finbarrSecure sandbox for AI coding agents
New!
Top 69.3% on SourcePulse
finbarr/yolobox provides a secure, sandboxed environment for running AI coding agents, mitigating the risk of accidental system damage. It targets developers who want to leverage powerful AI assistants like Claude Code or Codex in "YOLO mode" (unrestricted command execution) without compromising their host system's integrity, particularly their home directory. The primary benefit is enabling aggressive AI-driven development workflows with a robust safety net.
How It Works
yolobox utilizes containerization (Docker or Podman) as its security boundary. It launches a container where the user's project directory is mounted at /workspace with read-write permissions. Inside the container, the AI agent has full permissions and sudo access. Crucially, the host's home directory is intentionally not mounted by default, preventing accidental rm -rf ~ scenarios. Persistent volumes ensure tools and configurations are retained across sessions, offering a balance between AI freedom and host system protection.
Quick Start & Requirements
curl -fsSL https://raw.githubusercontent.com/finbarr/yolobox/master/install.sh | bash or by cloning the repository and running make install.cd /path/to/your/project) and run yolobox.Highlighted Details
~/.config/yolobox/config.toml, .yolobox.toml) for image, mounts, environment variables, and network settings.Maintenance & Community
No specific details regarding maintainers, community channels (e.g., Discord/Slack), or roadmap were provided in the README excerpt.
Licensing & Compatibility
Licensed under the MIT License. This license generally permits commercial use and integration with closed-source projects without significant restrictions.
Limitations & Caveats
The security model relies on container isolation and does not protect against sophisticated container escape vulnerabilities or deliberate adversarial AI attempts to break out of the sandbox. For maximum security against kernel-level exploits, VM-level isolation is recommended. The project directory is mounted read-write by default, and network access is enabled unless explicitly disabled.
3 days ago
Inactive
vercel-labs
abshkbh