Skip to content

Sandbox execution options: minimal Python-slim path vs dedicated image #8

@christian-taillon

Description

@christian-taillon

Awesome project - very cool work, and I'm genuinely glad to see one with security considerations baked in from the start.

Related to that, I'm excited to help close the gap on reliable sandboxing/isolation in a containerized workflow. In cyber, a usable secure-by-default workflow is critical for adoption, especially with increasing threats targeting autonomous coding systems.

TL;DR

  • What: sandbox execution had reliability issues across container runtime/host combinations.
  • Why: base image/tooling mismatches, container-host permission contexts, and runtime env details caused failures.
  • How: I validated two approaches:
    1. Minimal-change path: keep python:3.11-slim and install only what sandbox execution needs.
    2. Alternative path: dedicated Node-first sandbox image with tighter toolchain control.

I am proposing a PR with the minimal-change Python-slim approach first, and documenting the dedicated-image approach as a future option if you want stronger packaging/control boundaries.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions