Comment by senko

Comment by senko 7 hours ago

6 replies

> take a snapshot of my current workspace in a VM. Run claude there

Sounds like docker + overlayfs might fit the bill, as long as there's a base image that is close enough to what you need.

I don't think there should be One True Way how to run these, everyone can set it up in a way that best fits their workflow.

ushakov 6 hours ago

both Docker and bubblewrap are not secure sandboxes. the only way to have actually isolated sandboxes is by using VMs

disclaimer: i work on secure sandboxes at E2B

  • gf000 5 hours ago

    What about cgroups? I know they are not exactly analogous, but to me that seems like a pretty decent solution.

  • senko 6 hours ago

    No disagreement from me. From the article:

    > Bubblewrap and Docker are not hardened security isolation mechanisms, but that's okay with me.

    Edit to add: my understanding is the major flaw in this approach is potential bugs in Linux kernel that would allow sandbox escape. Would appreciate your insight if there are some easier/more probable attack vectors.

  • its-summertime 6 hours ago

    Do you have more information on how to set up such VMs?

    • ushakov 5 hours ago

      for personal use, many ways: Vargant, Docker Sandbox, NixOS VMs, Lima, OrbStack.

      if you want multi-tenant: E2B (open-source, self-hosted)

      • eikenberry 3 hours ago

        Hashicorp has mostly abandoned Vagrant, so I'd avoid it.