Beta
Documentation
SecuritySandboxing

Sandboxing

Container Sandboxing

ThinkFleet runs agents in isolated Docker containers to prevent unintended access to the host system or other tenants.

Sandbox Modes

ModeBehavior
OffNo sandbox — agent runs on host (not recommended for production)
AllAll sessions sandboxed in containers
Non-mainDMs run on host, group sessions run in containers

Sandbox Scope

ScopeBehavior
SessionOne container per session (maximum isolation)
SharedOne container shared across all sessions for an agent

Resource Limits

Each container has configurable resource limits:

  • CPU — Allocated in millicores
  • Memory — Allocated in MB
  • Storage — Allocated in GB

These limits prevent any single agent from consuming excessive resources.

Elevated Mode

When sandboxing is enabled, agents can request temporary elevated access to the host system for specific operations. This requires:

  1. Elevated mode enabled in configuration
  2. Explicit approval per command (ask policy)
  3. Command allowlist/denylist

Elevated mode is disabled by default and should only be used when necessary.

Workspace Access

Container access to the agent workspace can be controlled:

LevelAccess
NoneNo workspace access
Read-onlyCan read but not modify workspace files
Read-writeFull workspace access (default)