4 pointsby decodebytes6 hours ago3 comments
  • gossterrible4 hours ago
    I think with access to bash any AI agent can write a basic python/bash script and run it to evade you sandbox , Right ?
  • sukinai6 hours ago
    This hits the real problem: once agents execute code, “please don’t read ~/.ssh” is not a security control. Kernel-enforced isolation + tight allowlists is. The secrets workflow (keychain/secret service → env → zeroize) is especially practical. Biggest thing I’d want as a user is very explicit docs on the remaining gaps (macOS read-permissive mode, procfs/env/subprocess behavior, and what Landlock can’t cover yet vs seccomp). If that’s clear, this could be a default wrapper for local agent runs.
  • grigio5 hours ago
    nice project, it seems the only non-broken websites are Github and nono.sh