agentpad runs real processes on your machine with the user’s privileges. It is a convenience layer for agents and automation, not a sandbox.
cwdpassed torun()must resolve inside the workspace (effectiveRoot); otherwise it throws.- Read-only mode blocks writes through the provided
fsadapter; it does not stop a shell command from redirecting to arbitrary paths unless you control the command. - Timeouts send SIGKILL after
timeoutMs(per engine implementation).
- No seccomp, no containers, no VM—bash/python/node can invoke any binary on
PATH. - SQL uses the host’s
sqlite3CLI with the process environment you supply. - Overlay still executes with full user permissions;
apply()overwrites files in the real root.
- Run agents under a dedicated OS user or container with minimal filesystem access.
- Prefer read-only or overlay when exploring untrusted code; review before
apply(). - Set tight
timeoutMsandmaxOutputBytesfor untrusted workloads. - Do not expose
Runtimedirectly over the public internet without an additional security boundary.
The npm package depends on minimatch for glob handling only; execution uses Node child_process.