Loading...
Loading...
Generate Docker sandbox configurations for safely running untrusted OpenClaw skills. Isolates filesystem, network, and process access.
npx skill4agent add useai-pro/openclaw-skills sandbox-guardshellFROM node:20-alpine
RUN adduser -D -h /workspace openclaw
WORKDIR /workspace
USER openclaw
# No network, no elevated privileges
# Mount project as read-onlydocker run --rm \
--network none \
--read-only \
--tmpfs /tmp:size=64m \
--cap-drop ALL \
--security-opt no-new-privileges \
-v "$(pwd):/workspace:ro" \
openclaw-sandboxFROM node:20-alpine
RUN adduser -D -h /workspace openclaw
WORKDIR /workspace
USER openclawdocker run --rm \
--network none \
--cap-drop ALL \
--security-opt no-new-privileges \
--memory 512m \
--cpus 1 \
--pids-limit 100 \
-v "$(pwd):/workspace" \
openclaw-sandboxFROM node:20-alpine
RUN adduser -D -h /workspace openclaw
WORKDIR /workspace
USER openclawdocker run --rm \
--cap-drop ALL \
--security-opt no-new-privileges \
--memory 512m \
--cpus 1 \
--pids-limit 100 \
--dns 1.1.1.1 \
-v "$(pwd):/workspace" \
openclaw-sandbox--networkSkill: <name>
Permissions: fileRead, fileWrite, network, shell| Flag | Purpose |
|---|---|
| Remove all Linux capabilities |
| Prevent privilege escalation |
| Read-only filesystem (if no fileWrite) |
| Disable network (if no network permission) |
| Limit memory usage |
| Limit CPU usage |
| Limit number of processes |
| Temporary writable space |
| Run as non-root user |
--privileged/var/run/docker.sock~/.ssh~/.aws/etc--cap-drop ALLshell.openclaw/sandbox/