Skip to main content

Sandboxed system administration for LLM agents

Project description

Shannot

Tests License Python Linux

Human-in-the-loop execution for LLM agents.

Shannot Demo

Shannot lets you see what AI agents want to do before they do it. Scripts run in a supervised environment that captures all commands and file writes. You review in a TUI, approve what's safe, and only then do changes apply.

Open in GitHub Codespaces

How It Works

flowchart LR
    A[🤖 Agent writes script] --> B[shannot run]
    B --> C[📋 Intent captured]
    C --> D[shannot approve]
    D --> E[👤 Human reviews]
    E -->|✓| F[✅ Executes]
    E -->|✗| G[🚫 Blocked]

Quick Start

# Install
pip install shannot

# Run a script (captures what it wants to do)
shannot run fix-nginx.py

# Review and approve
shannot approve

That's it. Two commands.

Features

Supervised Execution

  • All system calls intercepted via PyPy sandbox
  • Commands captured during dry-run, executed only after approval
  • File writes captured with full content, committed only after approval
  • Diff preview for every file modification

Remote Execution

  • Run scripts on remote Linux servers via SSH
  • Zero dependencies on target — binary deployment
  • Same approval workflow, regardless of where code runs
shannot run fix-nginx.py --target admin@prod.example.com
shannot approve

Zero Dependencies

  • Pure Python stdlib — nothing to install beyond Python 3.11+
  • PyPy sandbox runtime auto-downloads on first use
  • Works out of the box on any Linux system

Danger Classification

  • Commands color-coded by risk in TUI
  • Auto-approve safe operations (ls, cat, df)
  • Always-deny destructive patterns (rm -rf /)
  • Everything else requires human review

Checkpoint and Rollback

  • Automatic checkpoint before execution
  • Restore files to pre-execution state with shannot rollback
  • Conflict detection prevents accidental overwrites

Installation

# Recommended
pip install shannot

# Or with uv
uv tool install shannot

# Or with pipx
pipx install shannot

Requirements:

  • Python 3.11+ (host system)
  • Linux (sandbox execution) or macOS (remote execution only)

Note: Scripts run in Python 3.6 (the PyPy sandbox version).

CLI Reference

# Core workflow
shannot run <script.py>       # Capture intent
shannot run -c "print(1+1)"   # Inline code
shannot approve               # Review and execute

# Execute specific session
shannot run --session <id>    # Execute approved session
shannot run --session <id> --json-output  # Machine-friendly

# Remote execution
shannot run <script.py> --target user@host

# Setup
shannot setup                 # Interactive menu
shannot setup runtime         # Install PyPy sandbox
shannot setup remote add prod admin@prod.example.com
shannot setup remote test prod
shannot setup mcp install     # Claude Desktop integration

# Status
shannot status                # Runtime, config, pending sessions

# Rollback
shannot rollback <session_id> # Restore files to pre-execution state
shannot checkpoint list       # List sessions with checkpoints
shannot checkpoint show <id>  # Show checkpoint details

Configuration

Single TOML file: ~/.config/shannot/config.toml (or .shannot/config.toml per-project)

[profile]
auto_approve = [
  "ls", "cat", "head", "tail", "df", "ps", "grep", "find",
  "systemctl status", "journalctl",
]
always_deny = [
  "rm -rf /", "rm -rf ~", "dd if=", "mkfs",
  "curl | sh", "wget | bash",
]

[audit]
enabled = true
rotation = "daily"
max_files = 30

[remotes.prod]
host = "prod.example.com"
user = "admin"

[remotes.staging]
host = "staging.local"
user = "deploy"

Why Not Just Use a Container?

Approach Trade-off
VM/Container Agent can't do real work — isolated from your actual system
WASM Capability-restricted — limited to what you expose
Policy sandbox Static rules — can't adapt to context
Shannot Agent does real work, with human approval

Shannot is collaborative, not adversarial. The agent helps you. You stay in control.

Use Cases

LLM-assisted sysadmin — Let Claude diagnose and fix server issues, with you approving each change

Safe exploration — Run unfamiliar scripts knowing you'll see exactly what they want to do

Audited automation — Every command and file write logged, nothing happens without approval

Teaching — Show students what scripts do before execution

Security Model

Shannot provides supervised execution, not absolute isolation.

What it provides:

  • System call interception via PyPy sandbox
  • Virtual filesystem — scripts see only what you expose
  • Command and file write approval workflow
  • Conflict detection for file modifications
  • Audit logging

What it doesn't provide:

  • Memory/CPU limits (use cgroups separately)
  • Network filtering (sockets are disabled entirely)
  • Protection against PyPy sandbox escapes

For production, combine with:

  • Dedicated service accounts (least privilege)
  • Resource limits (systemd, cgroups)
  • Network segmentation

See SECURITY.md for details.

MCP Integration

Shannot includes an MCP server for Claude Desktop:

shannot setup mcp install

This lets Claude propose scripts directly, which you review and approve through the standard workflow.

License

Apache 2.0 — See LICENSE

Contributing

See CONTRIBUTING.md

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

shannot-0.11.0.tar.gz (131.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

shannot-0.11.0-py3-none-any.whl (125.7 kB view details)

Uploaded Python 3

File details

Details for the file shannot-0.11.0.tar.gz.

File metadata

  • Download URL: shannot-0.11.0.tar.gz
  • Upload date:
  • Size: 131.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for shannot-0.11.0.tar.gz
Algorithm Hash digest
SHA256 0bf9919f42b837c328709e09f249ebec83928906668b458225bda6f66577506d
MD5 b5608dc523c9ab57b56d9d7b9d95c173
BLAKE2b-256 0f2b956a72e903b07f76a00786b4fd3d43baca8e7f1b4df15e634659bb4ba740

See more details on using hashes here.

Provenance

The following attestation bundles were made for shannot-0.11.0.tar.gz:

Publisher: release.yml on corv89/shannot

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file shannot-0.11.0-py3-none-any.whl.

File metadata

  • Download URL: shannot-0.11.0-py3-none-any.whl
  • Upload date:
  • Size: 125.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for shannot-0.11.0-py3-none-any.whl
Algorithm Hash digest
SHA256 a6b9296ae27daaf9419b49b7cc688a3bf5ee9bbb94f72357d92a91ac0e1eea9c
MD5 7af2c6907fb4d1f5f3ae1f854c37730a
BLAKE2b-256 dae386c90c693704d03cdc3fa20d5135cd65cc01de1e1b7694b69d89384b0b8d

See more details on using hashes here.

Provenance

The following attestation bundles were made for shannot-0.11.0-py3-none-any.whl:

Publisher: release.yml on corv89/shannot

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page