New guide file covering Docker Sandboxes (microVM isolation), cloud alternatives (Fly.io Sprites, E2B, Vercel, Cloudflare), safe autonomy workflows, and comparison matrix. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
3.9 KiB
3.9 KiB
Resource Evaluation: Docker Sandboxes & Sandbox Isolation Landscape
| Field | Value |
|---|---|
| Resource | Docker Sandboxes blog + docs.docker.com/ai/sandboxes/ |
| Type | Product launch + official documentation |
| Published | 2026-01-30 |
| Score | 4/5 (High Value) |
| Action | Integrated — new guide file + reference.yaml + cross-references |
Summary
- Docker Sandboxes (Docker Desktop 4.58+) provide microVM-based isolation for AI coding agents, replacing the older container-based approach. Claude Code runs with
--dangerously-skip-permissionsinside the sandbox since the VM itself is the security boundary. - Network policies offer allowlist/denylist modes with domain-level filtering, per-sandbox config, and built-in monitoring via
docker sandbox network log. Private CIDR ranges blocked by default. - Custom templates use standard Dockerfiles extending
docker/sandbox-templates:claude-code. Base image includes Ubuntu, Node.js, Python 3, Go, Git, Docker CLI, GitHub CLI, ripgrep, jq. - The broader landscape includes Fly.io Sprites (Firecracker microVMs, ~300ms checkpoint/restore), Cloudflare Sandbox SDK (container-based, Workers integration), E2B (open-source Firecracker, 150ms cold boot), and Vercel Sandboxes (GA 2026-01-30, Firecracker microVMs).
- Gap in the guide: No existing documentation on running Claude Code in isolated environments. The
--dangerously-skip-permissionswarning (ultimate-guide.md:3943) lacks a safe alternative path.
Gap Analysis
| Topic | Before | After |
|---|---|---|
| Safe autonomous execution | Warning only ("never use --dsp") | Documented pattern: sandbox + --dsp |
| Docker Sandboxes | Not mentioned | Full guide with commands, network, templates |
| Cloud sandbox alternatives | Not mentioned | 4 alternatives with comparison matrix |
| Isolation decision tree | Missing | Flowchart: local vs cloud vs serverless |
| Network policy configuration | Missing | Allowlist/denylist modes documented |
| Custom template creation | Missing | Dockerfile pattern documented |
Integration Decision
Score justification: 4/5 (High Value) rather than 5/5 because:
- Docker Sandboxes are genuinely useful and fill a real gap (safe autonomy)
- Official Docker documentation is reliable (Tier 1 source)
- However, the feature is Docker Desktop-only (no standalone Docker Engine support)
- Linux support limited to legacy container mode (not microVM)
- MCP Gateway not yet supported inside sandboxes
- Cloud alternatives are supplementary context, not Claude Code-specific features
Action: Create dedicated guide file (guide/sandbox-isolation.md) covering Docker Sandboxes as the primary solution with alternatives for cloud/CI scenarios.
Fact-Check
| Claim | Verification | Status |
|---|---|---|
| Docker Sandboxes use microVMs, not containers | docs.docker.com/ai/sandboxes/ | Verified |
| Claude Code runs with --dsp inside sandbox | docs.docker.com/ai/sandboxes/claude-code/ | Verified |
| Supported agents: Claude Code, Codex, Gemini, cagent, Kiro | docs.docker.com/ai/sandboxes/ | Verified |
| Network allowlist/denylist modes | docs.docker.com/ai/sandboxes/network-policies/ | Verified |
| macOS + Windows only for microVM mode | docs.docker.com/ai/sandboxes/ | Verified |
| Fly.io Sprites use Firecracker microVMs | sprites.dev | Verified |
| E2B cold boot ~150ms | e2b.dev | Claimed by vendor |
| Vercel Sandboxes GA 2026-01-30 | vercel.com announcement | Verified |
| Cloudflare uses containers, not microVMs | developers.cloudflare.com/sandbox/ | Verified |
Integration Applied
guide/sandbox-isolation.md— New guide file (~10 min read)machine-readable/reference.yaml— 13 new sandbox_* index entriesguide/ultimate-guide.md:3943— Cross-reference added after --dsp warningguide/README.md— Navigation entry addeddocs/resource-evaluations/README.md— Index entry added