agent-box
agent
Pass
Health Pass
- License — License: MIT
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Community trust — 16 GitHub stars
Code Pass
- Code scan — Scanned 12 files during light audit, no dangerous patterns found
Permissions Pass
- Permissions — No dangerous permissions requested
Purpose
This tool provides sandboxed containers and disposable Git/Jujutsu workspaces for AI coding agents. It includes an optional "Portal" feature to mediate and manage host system capabilities.
Security Assessment
Overall Risk: Low
The automated code scan of 12 files found no dangerous patterns, no hardcoded secrets, and the project requests no dangerous permissions. The fundamental design focuses on isolation and sandboxing, which inherently restricts the agent's access to sensitive data and prevents arbitrary execution on the host system. While the underlying architecture inherently manages shell commands and networking within those isolated boundaries, the primary host-facing interface appears strictly controlled.
Quality Assessment
The project is actively maintained, with the most recent push occurring today. It uses the permissive MIT license and includes comprehensive, well-structured documentation supported by an mdBook site. The codebase relies on Rust, a language known for memory safety, and utilizes a robust Nix-based development environment. However, community trust and adoption are currently very low, as indicated by only 16 GitHub stars.
Verdict
Safe to use, though it is a young tool with a small user base.
This tool provides sandboxed containers and disposable Git/Jujutsu workspaces for AI coding agents. It includes an optional "Portal" feature to mediate and manage host system capabilities.
Security Assessment
Overall Risk: Low
The automated code scan of 12 files found no dangerous patterns, no hardcoded secrets, and the project requests no dangerous permissions. The fundamental design focuses on isolation and sandboxing, which inherently restricts the agent's access to sensitive data and prevents arbitrary execution on the host system. While the underlying architecture inherently manages shell commands and networking within those isolated boundaries, the primary host-facing interface appears strictly controlled.
Quality Assessment
The project is actively maintained, with the most recent push occurring today. It uses the permissive MIT license and includes comprehensive, well-structured documentation supported by an mdBook site. The codebase relies on Rust, a language known for memory safety, and utilizes a robust Nix-based development environment. However, community trust and adoption are currently very low, as indicated by only 16 GitHub stars.
Verdict
Safe to use, though it is a young tool with a small user base.
Sandboxed containers for AI coding agents with disposable Git/Jujutsu workspaces
README.md
Agent-box
Agent-box provides sandboxed development workflows for coding agents, plus optional Portal-based host capability mediation.
[!NOTE]
This repository now uses the mdBook docs site as the primary documentation source.
Demo
Documentation
Read the docs in one of these ways:
- Build locally:
nix develop --command 'mdbook build docs' - Open generated site:
docs/book/index.html
Entry points:
Table of Contents
Quick links
- Agent-box first run
- Agent-box profiles guide
- Portal standalone first run
- Connect Portal to Agent-box
- Agent-box config reference
- Agent-box requirements
- Agent-box workflow internals
- Agent-box CLI reference (generated)
- Portal CLI reference (generated)
Related projects
- agent-images - Reproducible OCI container images for AI coding agents, built with Nix. Consumes agent packages from llm-agents.nix and produces images usable with agent-box or standalone Podman/Docker.
Development
From the repo root, run checks in the flake devshell:
nix develop --command cargo fmt --all
nix develop --command cargo check --workspace
nix develop --command cargo clippy --workspace --all-targets -- -D warnings
Regenerate CLI reference pages:
nix develop --command nix-shell -p nushell --run 'nu docs/scripts/generate-cli-reference.nu'
Reviews (0)
Sign in to leave a review.
Leave a reviewNo results found