Per-process network monitoring for your terminal with deep packet inspection. Cross-platform, sandboxed.
-
Updated
Apr 26, 2026 - Rust
Per-process network monitoring for your terminal with deep packet inspection. Cross-platform, sandboxed.
Lightweight, container-free sandbox for running commands with network and filesystem restrictions
macOS containment for AI agents — user isolation, kernel sandbox, pf firewall, DNS blocklist, backup/rollback. TLA+ verified.
A sandboxing library for Rust | now on https://codeberg.org/valpackett/rusty-sandbox
Tiny Agent: Production-Ready LLM Agent SDK for Every Developer
macOS Seatbelt sandbox CLI for developers. Protect credentials (SSH, AWS, GPG) from malicious npm packages, supply chain attacks, and untrusted build scripts. Deny-by-default filesystem isolation. Perfect for Claude Code agentic workflows with --dangerously-skip-permissions.
A Rusty implementation of the popular Seatbelt Windows enumeration tool
Sandboxed git worktrees for running claude --dangerously-skip-permissions safely. OS-native filesystem sandbox (macOS Seatbelt) — while keeping full Claude Code functionality.
lightweight OS-level sandbox for securing processes with filesystem and network controls - zero containers, zero fuss
Task SandBox - Sandbox security for AI development tools using macOS seatbelt
Apple Silicon native AI agent sandbox — three-tier isolated code execution with MCP server. pip install silicon-sandbox
Fast, kernel-enforced application sandbox for macOS and Linux. Default-deny TOML profiles, Seatbelt + Landlock + seccomp + namespaces under the hood. Pasta/slirp4netns auto-plumbed network with per-IP nftables.
Agent skill for adding a self-bootstrapping, in-process host-mutation guard to local dev/test workflows on modern macOS (15/26+)
Add a description, image, and links to the seatbelt topic page so that developers can more easily learn about it.
To associate your repository with the seatbelt topic, visit your repo's landing page and select "manage topics."