Lightweight, container-free sandbox for running commands with network and filesystem restrictions
-
Updated
Apr 10, 2026 - Go
Lightweight, container-free sandbox for running commands with network and filesystem restrictions
A sandboxing library for Rust | now on https://codeberg.org/valpackett/rusty-sandbox
macOS containment for AI agents — user isolation, kernel sandbox, pf firewall, DNS blocklist, backup/rollback. TLA+ verified.
Tiny Agent: Production-Ready LLM Agent SDK for Every Developer
macOS Seatbelt sandbox CLI for developers. Protect credentials (SSH, AWS, GPG) from malicious npm packages, supply chain attacks, and untrusted build scripts. Deny-by-default filesystem isolation. Perfect for Claude Code agentic workflows with --dangerously-skip-permissions.
A Rusty implementation of the popular Seatbelt Windows enumeration tool
enumerate the macOS Seatbelt sandbox through the magic of science
lightweight OS-level sandbox for securing processes with filesystem and network controls - zero containers, zero fuss
Sandboxed git worktrees for running claude --dangerously-skip-permissions safely. OS-native filesystem sandbox (macOS Seatbelt) — while keeping full Claude Code functionality.
Task SandBox - Sandbox security for AI development tools using macOS seatbelt
Apple Silicon native AI agent sandbox — three-tier isolated code execution with MCP server. pip install silicon-sandbox
Agent skill for adding a self-bootstrapping, in-process host-mutation guard to local dev/test workflows on modern macOS (15/26+)
Add a description, image, and links to the seatbelt topic page so that developers can more easily learn about it.
To associate your repository with the seatbelt topic, visit your repo's landing page and select "manage topics."