Discover and explore top open-source AI tools and projects—updated daily.
always-furtherKernel-enforced capability sandbox for AI agents
New!
Top 57.9% on SourcePulse
A secure, kernel-enforced capability sandbox for running untrusted AI agents and processes. It leverages OS security primitives like Linux's Landlock and macOS's Seatbelt to structurally prevent unauthorized operations, offering a robust security model beyond traditional policy-based sandboxes. This approach is beneficial for developers and researchers needing to isolate potentially risky AI workloads.
How It Works
nono implements a capability-based security model by directly utilizing kernel features. On Linux, it employs Landlock, and on macOS, Seatbelt. This mechanism ensures that unauthorized operations are impossible at the kernel level, rather than relying on runtime interception. The system grants minimal, explicit permissions to agents, and any attempt to exceed these bounds is denied by the OS, providing a strong, structural security guarantee.
Quick Start & Requirements
brew tap lukehinds/nono && brew install nono.Highlighted Details
rm, dd, chmod, sudo, and package managers for defense-in-depth.Maintenance & Community
No specific details on contributors, sponsorships, or community channels (e.g., Discord, Slack) are provided in the README.
Licensing & Compatibility
Licensed under Apache-2.0, which is generally permissive for commercial use and integration into closed-source projects.
Limitations & Caveats
This project is an early alpha release and has not undergone comprehensive security auditing or peer review. It is not recommended for production environments due to potential instability and ongoing policy file changes. Windows support is not yet implemented.
1 day ago
Inactive
vercel-labs
zerocore-ai
nearai