Go hard on agents, not on your filesystem

Scope of the Problem: Unconstrained Agents on Real Machines

  • Many developers routinely run coding agents with full permissions (--dangerously-skip-permissions, --yolo) on their main machines.
  • People know about containers/VMs in theory but often bypass them in the moment for convenience.
  • Reported damage ranges from rm -rf * to subtle breakage (e.g., creating a real /public/blog directory that hijacks a web server’s routing).
  • Several commenters note that agents can ignore or “work around” soft guardrails and textual safety instructions.

What jai Tries to Do

  • Opinionated Linux tool to wrap an agent in a lightweight container with:
    • Full R/W access to current directory.
    • Read-only access to the rest of the filesystem.
    • Copy‑on‑write home directory plus default blocking of common credential locations.
  • Goal: reduce friction compared to hand‑crafted bubblewrap/Docker invocations so sandboxing becomes default.
  • Some like this tradeoff and say it should be the default for agent tools; others say it still allows dangerous read access in “casual” mode.

Comparisons and Alternatives

  • Existing mechanisms mentioned: bubblewrap, firejail, seatbelt, systemd-run scopes, FreeBSD jails, dev containers, VMs (Lima, Colima, Qubes, macOS micro‑VMs), custom user accounts, SELinux/AppArmor/TOMOYO, zfs snapshots.
  • Several tools and configs already integrate bubblewrap (Claude Code, Codex, others), but their sandboxes can be misconfigured, silently bypassed, or buggy.
  • Some argue plain Unix permissions (separate user + shared group folder) are sufficient; others prefer full VMs with no host access.

Security Debates and Gaps

  • Strong view: LLM outputs and agents should be treated as untrusted/malware; sandboxing must be enforced outside the LLM, not by it.
  • Concerns go beyond filesystem:
    • Exfiltration of cookies, SSH/AWS keys, secrets in dotfiles and env vars.
    • External side effects: APIs, databases, email, Slack, PRs, payment systems.
  • Some propose overlay-on-CWD plus explicit diff/patch workflows so only reviewed changes leave the sandbox; warn about agent-written artifacts like .git/hooks, .venv, .pyc.
  • Skeptics say filesystem isolation alone is “security theater” if network and credentials aren’t addressed.

Reaction to Project & Presentation

  • Many praise the idea and implementation; see it as a pragmatic step toward safer agents.
  • Others criticize the marketing/splash page as giving an inflated sense of safety and being LLM‑generated “slop,” though documentation and man page are viewed more favorably.