The browser is the sandbox

Browser as Sandbox & File System Access

  • Many find the “browser as sandbox” framing compelling: it leverages decades of hardening against hostile web content, versus constantly reinventing container/VM sandboxes for untrusted code.
  • The webkitdirectory / folder input and File System Access API surprised several people; it unlocks powerful local tooling (e.g., AI agents manipulating project directories) entirely in the browser.
  • Tradeoff: strong containment (no syscalls, no arbitrary binaries, no direct hardware) but limited capabilities. Fine for many AI coding / document workflows, a deal-breaker for others.
  • Some argue CLI tools and NPM-style source processors should target the browser sandbox instead of Node’s non-standard, shifting APIs.

Portability, Browser Monoculture & Standards

  • Criticism that the article implicitly treats Chrome-only APIs as “the browser”; calls to say “a browser” and avoid normalizing Chrome-specific features.
  • One camp refuses to ship features that only work in Chrome, to avoid encouraging monoculture.
  • Another camp says withholding Chrome-only enhancements penalizes most users for Firefox/Safari’s conservatism; users can install multiple browsers, and many Chromium-based browsers are not directly controlled by Google.
  • File System Access API is highlighted as transformative for web productivity, but also as a reason some vendors hesitate (new exfiltration risk; breaks user expectations about web apps not editing arbitrary local files).

Security: How Good a Sandbox Is the Browser?

  • Supporters: browser sandboxes are among the few mechanisms used safely at massive scale to run arbitrary, untrusted code; layering iframes, CSP, and WASM can yield robust isolation.
  • Skeptics: modern browsers are “Swiss cheese” — tens of millions of LOC, constant sandbox escapes, enormous feature surface, complex CA trust model; structurally hard to secure.
  • Comparisons with other models:
    • Unix users/groups, systemd, cgroups, AppArmor, SELinux, FreeBSD Capsicum, Qubes, containers, and VMs all appear as alternative or complementary sandboxes.
    • Consensus that no sandbox is perfect; defense-in-depth and capabilities-based models are preferable to raw Unix permissions.

Agents, Local Execution & Economics

  • Strong interest in using the browser sandbox for AI coding/assistant agents that:
    • Operate on a user-selected directory.
    • Use WASM tools.
    • Avoid risking the full OS or home directory.
  • Benefits: offloading inference or tooling to the client can be economically necessary for bootstrapped AI products; greatly reduced backend compute costs and latency.
  • Downsides: harder to support collaboration, long-running/background tasks, and integration with arbitrary local tools (CLIs, non-remote MCP servers).

Broader Safety & OS Responsibilities

  • Several argue that while browser-based file access can sandbox the filesystem, it does not protect email, banking, or other high-value accounts accessible in the same browser profile.
  • Suggestions include separate browser profiles or machines, but others note average users won’t manage such isolation.
  • A recurring theme: browsers are doing work that operating systems should have provided (fine-grained, default-on application sandboxing), and OS stagnation pushed security responsibilities into the web stack.