From claude-ecosystem
Guides Claude Code sandbox configuration for filesystem/network isolation, OS enforcement (bubblewrap/Seatbelt), proxies, escape hatches, and troubleshooting via docs-management delegation.
npx claudepluginhub melodic-software/claude-code-plugins --plugin claude-ecosystemThis skill is limited to using the following tools:
> **STOP - Before providing ANY response about Claude Code sandboxing:**
Implements process isolation and sandboxing for untrusted code using seccomp-BPF, namespaces, AppArmor/SELinux on Linux; AppContainer on Windows; sandbox-exec on macOS; Docker/K8s contexts.
Builds secure code execution sandboxes on Cloudflare Workers with Sandbox SDK. Handles commands, Python/JS/TS interpreters, files, ports; prefers Cloudflare docs retrieval.
Enables secure execution of untrusted Python/Node.js code, git operations, and scripts in persistent Linux containers on Cloudflare edge using Workers SDK.
Share bugs, ideas, or general feedback.
STOP - Before providing ANY response about Claude Code sandboxing:
- INVOKE
docs-managementskill- QUERY for the user's specific topic
- BASE all responses EXCLUSIVELY on official documentation loaded
Skipping this step results in outdated or incorrect information.
Before responding, verify:
If ANY checkbox is unchecked, STOP and invoke docs-management first.
Central authority for Claude Code sandboxing and isolation. This skill uses 100% delegation to docs-management - it contains NO duplicated official documentation.
Architecture: Pure delegation with keyword registry. All official documentation is accessed via docs-management skill queries.
Keywords: sandboxing, sandbox, /sandbox, filesystem isolation, network isolation, bubblewrap, Seatbelt, dangerouslyDisableSandbox, allowUnsandboxedCommands, excludedCommands, httpProxyPort, socksProxyPort, domain restrictions, sandbox configuration, blocked access
Use this skill when:
Use these keywords when querying docs-management skill for official documentation:
| Topic | Keywords |
|---|---|
| Overview | "sandboxing", "sandboxed bash tool", "/sandbox command" |
| Why Sandbox | "why sandboxing", "approval fatigue", "sandbox productivity" |
| OS Enforcement | "bubblewrap", "Seatbelt", "OS-level enforcement" |
| Topic | Keywords |
|---|---|
| Default Behavior | "filesystem isolation", "sandbox filesystem", "default writes" |
| Blocked Access | "blocked access", "sandbox blocked patterns" |
| Custom Paths | "custom allowed paths", "custom denied paths" |
| Protection | "critical file modification", "filesystem protection" |
| Topic | Keywords |
|---|---|
| Domain Restrictions | "network isolation", "domain restrictions", "sandbox network" |
| Proxy Support | "httpProxyPort", "socksProxyPort", "custom proxy" |
| User Confirmation | "user confirmation domains", "new domain approval" |
| Topic | Keywords |
|---|---|
| Settings | "sandbox configuration", "sandbox settings" |
| Escape Hatch | "dangerouslyDisableSandbox", "allowUnsandboxedCommands" |
| Excluded Commands | "excludedCommands", "sandbox exclusions" |
| Security Limitations | "sandbox security limitations", "domain fronting" |
What do you want to do?
| Issue | Keywords for docs-management |
|---|---|
| Sandbox blocking commands | "excludedCommands", "allowUnsandboxedCommands" |
| Network requests blocked | "network isolation", "domain restrictions" |
| Filesystem access denied | "filesystem isolation", "blocked access" |
| Proxy not working | "httpProxyPort", "socksProxyPort" |
Date: 2025-11-30 Model: claude-opus-4-5-20251101