What I’ve seen suggests the most common answers are (a) “containers” and (b) “YOLO!” (maybe adding, “Please play nice, agent.”).
One approach that I’m about to try is Sandvault [0] (macOS only), which uses the good old Unix user system together with some added precautions. Basically, give an agent its own unprivileged user account and interact with it via sudo, SSH, and shared directories.
edit: I don’t have a problem with closed source, but when software is expected to be accountable for my security I get a little paranoid, so was curious about the safety and guarantees here. The UX and everything else looks great
It uses only 3 dependencies that are very well known and widely used, so supply chain risk is minimal. That leaves me, the developer, as the main point of trust.
One of the nice things in Multitui is that it monitors what is blocked and gives you a way to add a read/write rule from the UI.
- UI for sandbox-exec to protect filesystem - Network sandbox per domain - Secrets filter via gitleaks - Vertical tabs option
It's highly customizable. You generate native macOS app wrappers for each terminal app, each with its own rules and customizations.
https://multitui.com