We Built Secure, Scalable Agent Sandbox Infrastructure

(browser-use.com)

30 points | by gregpr07 6 hours ago

4 comments

  • orf 53 minutes ago
    The first 3 “hardening” points are not great.

    Essentially it’s just: remove .py files an execute del os.environ[“SESSION_TOKEN“]? This doesn’t really sound very secure, there are a number of ways to bypass both of these.

    It’s just security through obscurity

  • yakkomajuri 1 hour ago
    I think this is pretty standard and similar to approaches that are evolving naturally (I've certainly used very similar patterns).

    I'd be pretty keen to actually hear more about the Unikraft setup and other deeper details about the agent sandboxes regarding the tradeoffs and optimizations made. All the components are there but has someone open-sourced a more plug-and-play setup like this?

  • jeremyjacob 1 hour ago
    It’s neat to see more projects adopting Unikernals. I’ve played around with Unikraft’s Cloud offering about a year ago when it was CLI/API only and was impressed by the performance but found too many DX and polish issues to take it to production. Looks like they’ve improved a lot of that since.
  • Bnjoroge 1 hour ago
    maybe the usecase that makes unikernels alot more mainstream. Always found them intriguing
    • eyberg 29 minutes ago
      Except this is very clearly running linux.
      • lazharichir 27 minutes ago
        What can you NOT run on this, it's not very clear? Is it like MicroVMs on steroids where you can run more binaries than the strict minimum?