Custom Sandbox Image
The defaultrisoluto-codex:latest image ships with Node.js 22, Codex CLI, Git, and common developer tools. When your project needs extra runtimes or tooling, build a custom image.
When you need this
- Your project uses Python, Go, Rust, Java, or other runtimes
- You want project dependencies pre-installed for faster agent startup
- You need specialized CLIs (
terraform,kubectl,aws,gcloud) - You want a reproducible, locked-down agent environment
Build a custom image
Pre-installing dependencies
Bake your project’s dependency tree into the image for faster agent startup:Dockerfile.with-deps
Advanced options
Enable gVisor for stronger isolation
Enable gVisor for stronger isolation
gVisor intercepts syscalls, providing an additional isolation layer between the agent and the host kernel.Prerequisites:
runsc must be installed on the host and registered as a Docker runtime. gVisor adds latency overhead but is recommended for untrusted workloads.Configure egress allowlist
Configure egress allowlist
Restrict which domains the agent container can reach:Any outbound connection to a domain not on the list is blocked.
Add extra bind mounts
Add extra bind mounts
Mount host directories into the container for shared caches, config files, or read-only data:
Environment variable passthrough
Environment variable passthrough
Forward specific host environment variables into the sandbox:
What’s Next
Multi-repo Setup
Route issues to different repos with prefix and label matching.
Monitoring Stack
Set up Prometheus and Grafana to monitor agent runs.
Trust Model
Understand the sandbox security boundaries.