Skip to content

Add Hazmat to Sandboxing & Isolation#3

Open
dredozubov wants to merge 1 commit intobureado:mainfrom
dredozubov:add-hazmat
Open

Add Hazmat to Sandboxing & Isolation#3
dredozubov wants to merge 1 commit intobureado:mainfrom
dredozubov:add-hazmat

Conversation

@dredozubov
Copy link
Copy Markdown

@dredozubov dredozubov commented Apr 18, 2026

Hazmat contains AI/coding agents on macOS. The agent runs under its own UID (not the operator's), under a Seatbelt policy applied via sandbox_init() from a small privileged helper (not sandbox-exec), with PF anchors and DNS blocklists for per-session network policy, plus backup/rollback for reversible host setup.

The design is checked in TLA+ across nine specs (~44,795 states): setup/rollback ordering, seatbelt credential-deny policy, backup safety, version migration, Tier 2/Tier 3 policy equivalence, session-time host permission repairs, harness lifecycle, and helper fd hygiene before sandbox_init.

Sits next to capsem and ai-jail on the macOS side.

https://github.com/dredozubov/hazmat

macOS-native runtime containment for AI agents and coding-agent
workflows using isolated users, Seatbelt sandboxing, PF firewall
controls, DNS blocklists, backup/rollback, and TLA+-checked design.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant