The Paranoid Guide to Running Copilot CLI in a Secure Docker Sandbox
Postedabout 2 months agoActiveabout 2 months ago
gordonbeeming.comTechstory
calmpositive
Debate
40/100
AI SecurityDockerSandboxing
Key topics
AI Security
Docker
Sandboxing
The article discusses running Copilot CLI in a secure Docker sandbox, and the discussion revolves around alternative approaches and concerns about sandboxing AI tools.
Snapshot generated from the HN discussion
Discussion Activity
Active discussionFirst comment
7d
Peak period
13
156-168h
Avg / period
7
Comment distribution14 data points
Loading chart...
Based on 14 loaded comments
Key moments
- 01Story posted
Nov 4, 2025 at 8:14 AM EST
about 2 months ago
Step 01 - 02First comment
Nov 10, 2025 at 8:49 PM EST
7d after posting
Step 02 - 03Peak activity
13 comments in 156-168h
Hottest window of the conversation
Step 03 - 04Latest activity
Nov 11, 2025 at 11:18 AM EST
about 2 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45810658Type: storyLast synced: 11/20/2025, 12:38:35 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
At my company (StrongDM) we recently open-sourced a tool in this space called Leash: https://github.com/strongdm/leash
By default it runs in docker, and also includes an extra sophisticated macOS-native --darwin mode which goes beyond the capabilities and guarantees of the likes of sandbox-exe, bubblewrap, and in some ways docker. Leash provides visibility into and control over every command and network request attempted by the coder agent. Would appreciate any feedback, and will try to get in touch with the author (Gordon).
Now I'll definitely look into automatically supporting pass-through auth for at least gh cli in Leash - always looking for what folks will find useful.
On the other side of the spectrum, we're working on a lightweight approach that augments user namespaces with libseccomp to filter syscalls via BPF.
https://github.com/corv89/shannot
Claude or Gemini CLI absolutely will try crazy things after enough cycles of failed attempts of fixing some issues.
https://github.com/codazoda/llm-jail