|
|
||
|---|---|---|
| LICENSE | ||
| README.md | ||
| SECURITY.md | ||
Docker Sandboxes
Safe environments for agents. Built by Docker.
What it does
It provides sandboxes with controlled access to your filesystem, network, and tools. This means your agents can work autonomously without putting your machine or data at risk.
Details
- Docker-native isolation. Same containerization principles trusted by 20M+ developers.
- Vendor-neutral. Works with the models and tools you’re already using.
What you get
- YOLO mode by default: agents work without asking permission
- Private Docker daemon for running test containers
- File access controls between host and sandbox
- Network access control
- Works with Claude Code, Codex, Gemini CLI, OpenCode, and more
Install
Homebrew (macOS)
brew install docker/tap/sbx
WinGet (Windows)
winget install -h Docker.sbx
Manual install from release artifacts
Download the artifacts for your platform from the latest release.
macOS
Download DockerSandboxes-darwin.tar.gz and extract:
tar -xzf DockerSandboxes-darwin.tar.gz
Windows
Download DockerSandboxes.msi
and double-click to install, or use the command line:
msiexec /i DockerSandboxes.msi /quiet
Ubuntu / Debian
Download the .deb package from the release and install:
sudo apt install ./DockerSandboxes-linux-amd64.deb
RHEL / Fedora
Download the .rpm package from the release and install:
sudo dnf install ./DockerSandboxes-linux-amd64.rpm
Nightly releases
Nightly builds from main are available at
docker/sbx-releases/releases/tag/nightly.
On macOS, you can install the nightly build via Homebrew:
brew install docker/tap/ds@nightly
For other platforms, download the artifacts from the nightly release page and follow the manual install instructions above.
Feedback
If you run into issues or have feedback, please open an issue on this repository.
Learn more
License
Proprietary — Docker Inc. LICENSE