Skip to content

feat(run-prompt): add --sandbox bubblewrap for Linux prompt execution #9

@cruzanstx

Description

@cruzanstx

Summary

Add first-class Bubblewrap execution to /run-prompt so Linux users can run prompts with one flag instead of writing custom bwrap wrappers.

Proposed UX

  • /run-prompt <id> --sandbox bubblewrap
  • Optional: --sandbox-profile strict|balanced|dev
  • Optional: --sandbox-workspace <path>
  • Optional: --sandbox-net on|off

Why

Linux users need a lightweight sandbox path comparable to seatbelt-style workflows on macOS, without forcing Docker/Podman. Bubblewrap works well but policy setup is error-prone when done manually.

Behavior expectations

  • Auto-detect bwrap and run prompt in a generated policy wrapper
  • Safe defaults by profile:
    • strict: minimal RW mounts, no net by default
    • balanced: project RW + required cache/config/state dirs, net enabled
    • dev: wider compatibility for plugin-heavy/dev workflows
  • Include --new-session and secure defaults around terminal injection concerns
  • Clear warnings for high-risk mounts (broad HOME, D-Bus sockets, etc.)

Failure handling

  • If bwrap is missing, show install hint and fail with actionable guidance
  • Optional explicit fallback flag if user wants to run unsandboxed

Acceptance criteria

  • Linux user can run /run-prompt <id> --sandbox bubblewrap without manual script authoring
  • Profiles are documented with tradeoffs
  • Strict profile blocks access outside allowed workspaces
  • Balanced/dev profiles keep common agent workflows functional
  • Troubleshooting docs cover missing certs/DNS binds/userns constraints

References

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions