The right link is https://github.com/vrn21/bouvet
Congrats on launching, and great testimonials!
What problem does it solve compared to bazillion code execution sandboxing agents (and containers/VMs)?
Overall, a lot of people are building their own code execution sandboxing agents around containers/VMs. Curious to know what's missing that makes people DIY this?
Here's my list of code execution sandboxing agents launched in the last year alone:
1. E2B 2. AIO Sandbox 3. Sandboxer 4. AgentSphere 5. Yolobox 6. Exe.dev 7. yolo-cage 8. SkillFS ERA Jazzberry Computer Vibekit Daytona Modal Cognitora YepCode Run Compute CLI Fence Landrun Sprites pctx-sandbox pctx Sandbox Agent SDK Lima-devbox OpenServ Browser Agent Playground Flintlock Agent Quickstart Bouvet Sandbox Arrakis Cellmate (ceLLMate) AgentFence Tasker
This relies on the agent requesting a sandbox... which seems like the fox guarding the hen house, no?
Can someone elaborate with whats wrong with having containers for sandbox?
Great idea that is already implemented as a feature by major AI providers, several well funded startups, countless unfunded startups, and trivially solved per-user with any handful of existing technologies.
Truly baffling its in the top 5 of the front page. My first thought was bot army upvoting but the total points are quite low. That means this is some mod's personal idea of an especially interesting submission?
Anyone have any thoughts on this path if using macOS? Been using it, seems to do the trick pretty well out of the box.
https://developer.apple.com/documentation/Virtualization/run...
Sorry for the issue with the link, the accurate link is: https://github.com/vrn21/bouvet
Seems these thing pop up here ever so often. Either using firecracker or docker/containers. How is this different from the other sandboxes? BTW I love that you got LLM testimonials lol
Getting a 404 page not found for this project - how can I try it?
Cool option, I'm building in the same space. We should chat!
You built a voluntary sandbox and it also uses lots of tokens in the context to load in the MCP definition?
Just looking to understand if the sandbox can be bypassed?
Having testimonials attributed to Gemini 3 Pro and Claude 4.5 Opus is... interesting. I'm curious what prompt was used to get those quotes.
We use a service but it is always nice to have a free option if you need it. Good stuff.
interesting is the idea the agent calls it or just alt to terminal bash etc tool calls hey your tool calls are all microvms, containers, isoshells, raw term, clawd/molt all credentials with weaker and weaker security demarcs?
Given that this is using Firecracker, is it Linux only?
Why is it a problem to use containers?
interesting
Is this a common pattern to have an agent request a sandbox? I feel like I'd want the whole agent running in it's own sandbox to begin with. Firecracker does look like a decent solution for that.