Features
OS-Enforced Security
Sandboxing enforced at the kernel level, not application level. Cannot be bypassed by the sandboxed process.
Capability-Based
Explicitly grant access to files, directories, and network. Everything else is denied by default.
Network Proxy
Domain-filtered, credential-injected network access. Sandboxed processes reach only allowed hosts. Real API keys never leave the supervisor.
Filesystem Rollback
Content-addressable snapshots with Merkle-committed state. Roll back any changes made by a sandboxed agent.
Cross-Platform
Works on Linux (Landlock) and macOS (Seatbelt) with a unified API.
Type-Safe
Full type stubs for IDE autocompletion and static type checking with mypy.
Quick Example
When to Use
The Python SDK is ideal for:- AI Agent Supervisors: Orchestrate sandboxed agents with network filtering, credential injection, and filesystem rollback
- Plugin Systems: Isolate third-party plugins from your main application
- Data Processing: Limit file access when processing untrusted data
- Testing: Ensure tests don’t accidentally modify system files
Platform Support
| Platform | Backend | Requirements |
|---|---|---|
| Linux | Landlock | Kernel 5.13+ with Landlock enabled |
| macOS | Seatbelt | macOS 10.5+ |
| Windows | - | Not supported |
Use
is_supported() to check if sandboxing is available at runtime.Next Steps
Installation
Install the SDK with pip or from source
Quickstart
Build your first sandboxed application
API Reference
Explore the full API documentation
Examples
See real-world usage patterns