Skip to content

osep: add OSEP-0004 secure container runtime support#177

Merged
jwx0925 merged 5 commits intoalibaba:mainfrom
hittyt:docs/secure-container
Feb 11, 2026
Merged

osep: add OSEP-0004 secure container runtime support#177
jwx0925 merged 5 commits intoalibaba:mainfrom
hittyt:docs/secure-container

Conversation

@hittyt
Copy link
Copy Markdown
Collaborator

@hittyt hittyt commented Feb 5, 2026

Summary

OpenSandbox executes untrusted AI-generated code. Standard container isolation (runc) may not provide sufficient protection against container escape attempts. Secure container runtimes provide hardware-level isolation to protect the host system.

This PR add OSEP-0004: Pluggable Secure Container Runtime Support - a design proposal for integrating secure container runtimes (gVisor, Firecracker, Kata Containers) into OpenSandbox.

Testing

  • Not run (only design doc)
  • Unit tests
  • Integration tests
  • e2e / manual verification

Breaking Changes

  • None
  • Yes (describe impact and migration path)

Checklist

Comment thread oseps/0004-secure-container-runtime.md Outdated
Comment thread oseps/0004-secure-container-runtime.md Outdated
Comment thread oseps/0004-secure-container-runtime.md Outdated
Comment thread oseps/0004-secure-container-runtime.md Outdated
@jwx0925
Copy link
Copy Markdown
Collaborator

jwx0925 commented Feb 5, 2026

@codex review

@chatgpt-codex-connector
Copy link
Copy Markdown

Codex Review: Didn't find any major issues. Nice work!

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

- Fix Firecracker positioning: not a standalone OCI runtime, only
  available via Kata Containers (kata-fc) in Kubernetes mode
- Add pooled sandbox runtime consistency validation (409 Conflict)
- Cover both K8s providers (BatchSandbox + AgentSandbox)
- Add kata-fc RuntimeClass and containerd config examples
- Refine compatibility matrix, performance data, and test plan

Co-authored-by: Cursor <cursoragent@cursor.com>
@fengcone
Copy link
Copy Markdown
Collaborator

fengcone commented Feb 6, 2026

LGTM

Comment thread oseps/0004-secure-container-runtime.md Outdated
Comment thread oseps/0004-secure-container-runtime.md
Comment thread oseps/0004-secure-container-runtime.md Outdated
Comment thread oseps/0004-secure-container-runtime.md Outdated
@hittyt hittyt requested review from fengcone and jwx0925 February 9, 2026 10:51
Replace per-request runtime selection with server-level configuration.
The secure runtime is now an infrastructure decision managed by
administrators, requiring no API or SDK changes.

Co-authored-by: Cursor <cursoragent@cursor.com>
@Pangjiping Pangjiping self-requested a review February 9, 2026 13:51
Pangjiping
Pangjiping previously approved these changes Feb 9, 2026
jwx0925
jwx0925 previously approved these changes Feb 11, 2026
Copy link
Copy Markdown
Collaborator

@jwx0925 jwx0925 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@jwx0925 jwx0925 merged commit f41dda4 into alibaba:main Feb 11, 2026
2 checks passed
@hittyt hittyt deleted the docs/secure-container branch February 11, 2026 12:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants