TIL: Claude Code local sandbox environment is open-source. > native OS sandboxing primitives (sandbox-exec on macOS, bubblewrap on Linux) and proxy-based network filtering. It can be used to sandbox the behaviour of agents, local MCP servers, bash commands and arbitrary processes.

Nov 8, 2025 · 1:27 PM UTC

Replying to @_philschmid
it’s funny because sandbox-exec has been marked as deprecated for a looong time and it’s going nowhere and everyone is using it on macOS
Replying to @_philschmid
Been looking for this. Sandboxing matters when agents execute bash commands - saves debugging weird permission failures.
1
Replying to @_philschmid
their approach to using native os primitives for sandboxing is really effective, also worth noting that it reduces the overhead of traditional virtualization methods.
Replying to @_philschmid
that’s huge for safely experimenting with agents and MCP servers locally without worrying about side effects
Replying to @_philschmid
I asked chatgpt 5 pro to make one for me. For linux it did used bubblewrap.
1
Replying to @_philschmid
Clearly having a local sandbox like this opens up a whole new world for safe experimentation.
Replying to @_philschmid
That's a cool find, Philipp! Using sandboxes for agents is a smart move, makes things much safer, no?
Replying to @_philschmid
Open-source keeps AI honest and creative.
Replying to @_philschmid
been waiting for this, sandboxing agents locally is huge for testing
Replying to @_philschmid
That's an exciting development in local sandbox environments.
Replying to @_philschmid
Do you have a Discord channel? I have a question and don't know where to find someone to answer it.