Skip to content

tobocop2/beebox

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

beebox: Another AI Agent Sandbox

A Docker-based agent sandbox for running AI coding agents in a secure, isolated environment.

This is a simple, configuration-file-driven way to run common AI agents inside Docker using a single command.


Why This Exists

There are many tools that achieve similar things.

I wanted:

  • Something simple
  • Not GUI-based
  • Easy to control via configuration files
  • Built entirely using local AI agents

So I built this.

It’s mostly an excuse to throw a real-world problem at free or local models and see what they could produce.

I also wanted something I could fully inspect and control without extra services, orchestration layers, or hidden complexity.


How It Works

  • Agents run inside isolated Docker containers
  • Everything is controlled via plain YAML configuration files
  • No orchestration, no background services, no GUI

Just Docker and bash.


Key Features

  • Secure Isolation: All agents run in isolated Docker containers with restricted capabilities
  • Agent Support: Run multiple AI agents (Claude, OpenCode, Codex, Goose, Gemini)
  • Network Control: Option to disable internet access for enhanced security
  • Credential Management: Persistent credential storage in Docker volumes
  • Few Dependencies: Only requires Docker and bash available on your system

Quick Start

./sandbox claude

Usage Examples

./sandbox claude                     # Run Claude in current directory
./sandbox -d /path/to/project claude # Run Claude in specific directory
./sandbox claude "prompt"            # Run Claude with single prompt

Configuration

All configuration is in plain YAML files:

  • config.yml – Global settings
  • agents/*.yml – Agent definitions

You can control:

  • Which agents are available
  • Whether internet access is enabled
  • How credentials are persisted

Everything is explicit and file-driven.


Security

  • Capabilities dropped by default
  • Network isolation when internet: false
  • Auto-cleanup on exit
  • Credential storage in Docker volume only

Security depends on configuration. If you mount sensitive host paths or privileged sockets, you reduce isolation.

This is meant to reduce risk and contain mistakes — not eliminate all possible attack surfaces.


Why Lightweight?

  • No GUI
  • No orchestration
  • No extra services
  • No hidden layers
  • Fast startup
  • Fully inspectable

Plain container. Plain config. Single command.

Entirely built with OpenCode, MiniMax M2.5 Free, Ollama, and Qwen

About

Secure Docker sandbox for running AI coding agents in isolated containers — config-driven, single command, no GUI

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors