SmolVM is a lightning-fast, secure microVM runtime designed for high-density isolation. It provides AI agents and tools with a safe, hardware-virtualized environment to execute untrusted code without risking the host system.
- π Secure Isolation: Hardware-level virtualization (utilizing Firecracker) for strong sandbox boundaries.
- β‘ Blazing Fast: MicroVMs boot in sub-second time with minimal overhead.
- π Python Native: Clean, high-level SDK for managing VM lifecycles and command execution.
- π Automatic Networking: Built-in NAT, port forwarding, and SSH tunneling.
- π οΈ Custom Images: Build specialized Debian-based rootfs images with your own tools.
- π§Ή Auto-Cleanup: Integrated resource management to keep your host system clean.
AI agents often need to execute arbitrary code (Python, JS, shell scripts) generated by LLMs. Running this code directly on your host or in standard containers can be risky.
- MicroVM-based Security: Unlike containers that share the host kernel, SmolVM uses KVM-backed microVMs. This provides a significantly smaller attack surface and stronger hardware-level isolation.
- Agent-First Design: SmolVM abstracts away the complexity of microVM networking, storage, and TAP devices into a simple, pythonic API.
- Linux + Firecracker backend: KVM support (Ubuntu/Debian/Fedora).
- macOS + QEMU backend: Homebrew and QEMU (
qemu-system-*).
# Install the Python package
pip install smolvmLinux (Firecracker):
sudo ./scripts/system-setup.sh --configure-runtimemacOS (QEMU):
./scripts/system-setup-macos.sh
# Optional explicit backend override:
# export SMOLVM_BACKEND=qemuInitialize a VM with no arguments for an auto-configured, SSH-ready environment:
from smolvm import SmolVM
# Start sandboxed runtime
vm = SmolVM()
vm.start()
# Run ANY command like a real system
result = vm.run("echo 'Hello from the sandbox!'")
print(result.output)
# Stop the runtime
vm.stop()Customize auto-config memory and disk size:
from smolvm import SmolVM
# Use with context manager (auto start and deletes after use)
with SmolVM(mem_size_mib=2048, disk_size_mib=4096) as vm:
print(vm.run("free -m").output)You can also reconnect to a running VM by its ID:
from smolvm import SmolVM
# Reconnect to an existing VM
vm = SmolVM.from_id("vm-abcdef12")
print(f"Status: {vm.status}")SmolVM now defaults to isolated per-VM disks (disk_mode="isolated"),
so each VM gets its own writable rootfs clone (sandbox-by-default).
If you intentionally want shared/persistent image behavior across VMs, set:
from smolvm import VMConfig
config = VMConfig(..., disk_mode="shared")Expose a guest application to your local machine securely. expose_local prefers host-local nftables forwarding and automatically falls back to an SSH tunnel when needed.
from smolvm import SmolVM
with SmolVM() as vm:
# Example: App in VM listening on port 8080, expose to host port 18080
host_port = vm.expose_local(guest_port=8080, host_port=18080)
print(f"App available at http://localhost:{host_port}")Inject environment variables into a running VM. Variables are persisted in
/etc/profile.d/smolvm_env.sh and apply to new SSH/login shell sessions.
from smolvm import SmolVM
with SmolVM() as vm:
vm.set_env_vars({"API_KEY": "sk-...", "DEBUG": "1"})
print(vm.list_env_vars())
print(vm.run("echo $API_KEY").output)CLI:
smolvm env set <vm_id> API_KEY=sk-... DEBUG=1
smolvm env list <vm_id> --show-values
smolvm env unset <vm_id> DEBUGDiagnostics:
# Auto-detect backend (Darwin -> qemu, Linux -> firecracker)
smolvm doctor
# Force backend checks
smolvm doctor --backend firecracker
smolvm doctor --backend qemu
# CI-friendly mode
smolvm doctor --json --strictSmolVM is optimized for low-latency agent workflows. Latest lifecycle timings (p50) on a standard Linux host:
| Phase | Time |
|---|---|
| Create + Start | ~572ms |
| SSH ready | ~2.1s |
| Command execution | ~43ms |
| Stop + Delete | ~751ms |
| Full lifecycle (boot β run β teardown) | ~3.5s |
Run the benchmark yourself:
python scripts/benchmarks/bench_subprocess.py --vms 10 -vMeasured on AMD Ryzen 7 7800X3D (8C/16T), Ubuntu Linux, KVM/Firecracker backend.
SmolVM currently prioritizes zero-touch VM access for local agent workflows.
By default, SSH host keys are not strictly verified during first connection
(paramiko.AutoAddPolicy).
- Use SmolVM on trusted/local networks and hosts.
- Do not expose guest SSH endpoints publicly without additional controls.
- See SECURITY.md for policy and scope details.
Apache 2.0 License - see LICENSE for details.