Secure sandbox for executing AI-generated code, untrusted scripts, and JS/TS microservices
Install • Quick Start • Getting Started • Walkthrough • API Reference
Ignite runs JavaScript/TypeScript code in secure, isolated Docker containers with network blocking, filesystem restrictions, and security auditing. Built for AI agents that generate code, student submissions, plugin systems, or any scenario where you need to run untrusted code safely.
┌──────────────┐ ┌──────────────┐ ┌──────────────┐
│ Untrusted │ ──► │ Ignite │ ──► │ Sandboxed │
│ Code │ │ Sandbox │ │ Execution │
└──────────────┘ └──────────────┘ └──────────────┘
Use cases:
- AI Agents - Safely execute LLM-generated code
- Code Playgrounds - Run student/user submissions
- Plugin Systems - Isolate third-party extensions
- CI/CD - Security checks before deployment
| Metric | Value |
|---|---|
| Runtimes | Bun (default), Node, Deno, QuickJS |
| Base Images | Alpine (minimal) |
| Platforms | Linux x64/ARM64, macOS x64/ARM64 |
| Dependencies | Docker only |
Note: Bun is the default runtime. Other runtimes are supported but increase the security attack surface; use them only when required and review service code and dependencies carefully.
# One-liner (Mac & Linux)
curl -fsSL https://raw.githubusercontent.com/dev-dami/ignite/master/install.sh | bash
# Or download from releases
# https://github.com/dev-dami/ignite/releasesBuild from source
git clone https://github.com/dev-dami/ignite.git && cd ignite
bun install && bun run build
bun run scripts/build-binaries.ts# Create a service
ignite init hello-world
cd hello-world
# Run it
ignite run .| Command | Description |
|---|---|
ignite init <name> |
Create new service |
ignite run <path> |
Execute in Docker |
ignite run <path> --audit |
Execute with security audit |
ignite preflight <path> |
Safety checks |
ignite serve |
HTTP API server |
ignite report <path> |
Execution report |
Run untrusted code safely with --audit mode:
ignite run ./my-service --auditEnforces:
- Zero network access
- Read-only filesystem (except
/tmp) - Dropped Linux capabilities
- No privilege escalation
Reports violations:
SECURITY AUDIT
Network
✗ connect: api.openai.com (blocked)
Filesystem
✗ write: /app/malicious.txt (blocked)
✗ Security Status: 2 VIOLATION(S) BLOCKED
Perfect for AI agent sandboxing, student code execution, or CI security checks.
| Doc | Description |
|---|---|
| Getting Started | 5-minute beginner guide |
| Walkthrough | Complete tutorial |
| API Reference | CLI & HTTP API docs |
| Architecture | System design |
| Preflight | Safety analysis |
MIT © dev-dami

