Skip to main content

Isag — Isolated Agent. Strict containerized sandboxes for coding agents.

Project description

Isag

Isag (/aɪˈzɑɡ/, "Isolated Agent") — sandboxes coding agents in containers with hard limits on what it can read, write, and reach.

Why

Isag gives the agent full freedom inside a container, while keeping your machine safe outside it. You get:

  • A filesystem scoped to what you mount. The agent sees only the directories you explicitly add. Your home directory, your SSH keys, the rest of your host — invisible.
  • Read-only mounts when you want them. Mount your project :ro to let the agent analyze without editing. Mount datasets :ro. Mount a scratch directory :rw. The kernel rejects writes to a read-only bind mount regardless of file permissions.
  • A network firewall. Outbound traffic is locked to a domain allowlist enforced at the kernel level. Anything else fails to connect — the agent can't lift the rule from inside.
  • Optional GPU passthrough. Flip one flag in the config to give the container CUDA + the NVIDIA toolkit.
  • Disposable container. Try experimental tooling without consequence — pip at runtime, system packages via extra_packages + rebuild. If something breaks, the host is untouched and Isag brings up a clean one.

Requirements

  • Linux host with Docker.
  • GPU mode needs the NVIDIA Container Toolkit.
  • Tested on Linux and WSL2. macOS (Docker Desktop / Rancher Desktop) and native Windows Docker should work but are untested.

Try it

Install:

pip install isag

Run:

isag init
isag run

You're inside the agent CLI now, in a container that can reach github.com, pypi.org, npm, and the vendor's API — and nothing else.

Expose a container service on the host's loopback. E.g., reach the container's SSH or Jupyter from your host (useful for IDEs and browsers):

isag ssh -L 2222:localhost:22 -L 8888:localhost:8888

Expose a host service to the container. E.g., give the container access to the host's adb server, and through it any devices the host can reach (USB, network, or via VPN):

isag ssh -R 5037:localhost:5037

The config file

isag init writes a starter isag.yaml. The lines you'll touch:

project: ~/code/my-project:/workspace/project:rw   # use :ro for analysis-only runs
agent:
  vendor: claude                                   # claude or codex
  host_home: ~/agents                              # vendors persist here as host_home/.claude, host_home/.codex; set to ~ to share history + credentials with your host install
container:
  python: 3.14                                     # container system-wide Python
  image: ubuntu24.04                               # or e.g. nvidia/cuda:12.8.1-runtime-ubuntu24.04 if gpu:true
  gpu: false                                       # true for CUDA + NVIDIA toolkit
  host_cache_dir: ~/isag-cache                     # mounting pip, npm, and other caches          
limit_network:
  domains:                                         # everything else is blocked
    - github.com
    - pypi.org
    - registry.npmjs.org
mounts:
  - ~/datasets:/workspace/datasets:ro              # add more mounts; :ro makes them read-only
exclude:                                           # hide paths inside any mount (set to null to disable)
  files:
    - .env
  folders:
    - .git
  • Set limit_network: null to turn the firewall off entirely. Useful on trusted networks; not the default for a reason.
  • Excluded paths are host paths; if they fall under project or any mounts entry, the corresponding container path is overlaid with an empty mount.
  • Both absolute and relative paths on the host are permitted for all fields. If a field path is relative, it is resolved relative to the project host path. If the project host path is also relative, it is first resolved relative to the YAML file path.
  • Command isag run displays the cache directory. Open it to view the files and commands used to run the project.

What it doesn't protect

  • Anything you mount writable — the agent has full access there.
  • Sibling containers, if you opt into external_networks.
  • Anything the agent can do at an allowlisted endpoint with credentials you gave it.

License

Apache-2.0.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

isag-0.2.2.tar.gz (30.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

isag-0.2.2-py3-none-any.whl (29.0 kB view details)

Uploaded Python 3

File details

Details for the file isag-0.2.2.tar.gz.

File metadata

  • Download URL: isag-0.2.2.tar.gz
  • Upload date:
  • Size: 30.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.13

File hashes

Hashes for isag-0.2.2.tar.gz
Algorithm Hash digest
SHA256 fed85e386e4b5efbac4abc05270b85329d4558811ac1e5958d46f21ead327065
MD5 67f800fd987c82d4f94a1dd4d3ad41b2
BLAKE2b-256 263e5120e3513362e1a9c497aeacb3f09964d3b833a243f1c873ad375c569036

See more details on using hashes here.

File details

Details for the file isag-0.2.2-py3-none-any.whl.

File metadata

  • Download URL: isag-0.2.2-py3-none-any.whl
  • Upload date:
  • Size: 29.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.13

File hashes

Hashes for isag-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 7cc51d8971dd9e3d204ca7c2270bacd8098d071dbf7febb64f808424b587bfac
MD5 934c90378b82e3721522cb9ae5267ba6
BLAKE2b-256 a82249791eb6f381d9252c156147eca640e92b9838ac30262315f9f7eb79e35f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page