Agent Safehouse is an open-source macOS hardening layer that uses sandbox-exec to confine local coding agents to explicitly approved paths instead of inheriting a developer account’s full access.
#sandboxing
A popular Hacker News post highlighted Agent Safehouse, a macOS tool that wraps Claude Code, Codex and similar agents in a deny-first sandbox using sandbox-exec. The project grants project-scoped access by default, blocks sensitive paths at the kernel layer, and ships as a single Bash script under Apache 2.0.
A high-engagement r/MachineLearning discussion introduced IronClaw, a Rust-based AI agent runtime designed around sandboxed tool execution, encrypted credential handling, and database-backed policy controls. The post landed because it treats agent security as a systems problem instead of a prompt-only problem.
A February 28, 2026 Hacker News thread discussed NanoClaw’s security model, emphasizing untrusted-agent assumptions, per-agent isolation, and limits of prompt-level safeguards.
A Docker guide on running NanoClaw inside a Shell Sandbox reached 102 points on Hacker News, highlighting a practical pattern for isolating agent runtime, limiting filesystem exposure, and keeping API keys out of the guest environment.