frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Don't YOLO your file system

https://jai.scs.stanford.edu/
76•mazieres•2h ago

Comments

mazieres•2h ago
What would it take for people to stop recklessly running unconstrained AI agents on machines they actually care about? A Stanford researcher thinks the answer is a new lightweight Linux container system that you don't have to configure or think about.
mememememememo•1h ago
Yes. It is like walking arounf your house with a flamethrower, but you added fire retardant. Just take the flamethower to a shed you don't mind losing. Which is some kind of cloud workspace most likely. Maybe an old laptop.

Still if you yolo online access and give it cred or access to tools that are authenticated there can still be dragons.

fouc•1h ago
except the big AI companies are pushing stuff designed for people to run on their personal computers, like Claude Cowork.
vardalab•47m ago
unconstrained AI agents are what makes it so useful though. I have been using claude for almost a year now and the biggest unlock was to stop being a worrywart early on and just literally giving it ssh keys and telling it to fix something. ofc I have backups and do run it in VM but in that VM it helps me manage by infra and i have a decent size homelab that would be no fun but a chore without this assistant.
BoppreH•1h ago
Excellent project, unfortunate title. I almost didn't click on it.

I like the tradeoff offered: full access to the current directory, read-only access to the rest, copy-on-write for the home directory. With stricter modes to (presumably) protect against data exfiltration too. It really feels like it should be the default for agent systems.

fouc•1h ago
Since the site itself doesn't really have a title, I probably would've went with something like "jai - filesystem containment for AI agents"
drtournier•1h ago
GPL v3…
mememememememo•1h ago
So?
triilman•1h ago
What would Jonathan Blow think about this.
ghighi7878•1h ago
My name is also jai
messh•1h ago
How is this different than say bubblewrap and others?
girvo•1h ago
https://jai.scs.stanford.edu/comparison.html#jai-vs-bubblewr...

> bubblewrap is more flexible and works without root. jai is more opinionated and requires far less ceremony for the common case. The 15-flag bwrap invocation that turns into a wrapper script is exactly the friction jai is designed to remove.

Plus some other comparisons, check the page

adi_kurian•1h ago
Claude's stock unprompted / uninspired UI code creates carbon clone components. That "jai is not a promise of perfect safety" callout box is like the em dash of FE code. The contrast, or lack thereof, makes some of the text particularly invisible.

I wonder if shitty looking websites and unambitious grammar will become how we prove we are human soon.

NetOpWibby•1h ago
Everything old is new again
AnotherGoodName•1h ago
Add this to .claude/settings.json:

  {                                                                                                                                                              
    "sandbox": {                                                                                                                                               
      "enabled": true,
      "filesystem": {
        "allowRead": ["."],
        "denyRead": ["~/"],
        "allowWrite": ["."],
        "denyWrite": ["/"]
      }                                                                                                                                                          
    }
  }

You can change the read part if you're ok with it reading outside. This feature was only added 10 days ago fwiw but it's great and pretty much this.
mycall•1h ago
I noticed codex has a sandbox, wondering if it has a comparable config section.
harikb•1h ago
I think the point would be that - some random upcoming revision of claude-code could remove or simply change the config name just as silently as it was introduced.

People might genuinely want some other software to do the sandboxing. Something other than the fox.

cozzyd•1h ago
Is this a real sandbox or just a pretty please?
AnotherGoodName•1h ago
https://code.claude.com/docs/en/sandboxing says they integrated bubblewrap (linux/windows), seatbelt (macos) and give an error if sandbox can't be supported so appears to be real.
throwaway6734•58m ago
https://docs.docker.com/ai/sandboxes/ Any idea on how that compares to this docker feature in development?
ray_v•24m ago
It seems like it's controlled by the Bash tool (https://code.claude.com/docs/en/sandboxing) and then bubblewrap (https://github.com/containers/bubblewrap) on linux and Seatbelt on mac at the system level
8cvor6j844qw_d6•1h ago
Interesting, thanks. I use remote ephemeral dev containers with isolated envs, so filesystem damage isn't really a concern as long as the PR looks good in review. Nice extra guardrail though, will add it to the project-level settings.
simonw•1h ago
Suggestion for the FAQ page: does this work on a Mac?
gerdesj•1h ago
Oh dear Lord! (pick your $DEITY)

Backups.

cozzyd•1h ago
Should be named Jia

More seriously, I'm not a heavy agent user, but I just create a user account for the agent with none of my own files or ssh keys or anything like that. Hopefully that's safe enough? I guess the truck is that it figures out a local privilege escalation exploit...

timcobb•1h ago
Dunno... with this setup it seems certain that the agent will discover a zero-day to escalate privilges and send your SSH keys to its handlers in N. Korea.

P.S. Everything old is new again <3

cozzyd•1h ago
Yeah definitely a concern. Probably need a sandbox and separate user for defense in depth.
mbreese•1h ago
This still is running in an isolated container, right?

Ignoring the confidentiality arguments posed here, I can’t help to think about snapshotting filesystems in this context. Wouldn’t something like ZFS be an obvious solution to an agent deleting or wildly changing files? That wouldn’t protect against all issue the authors are trying to address, but it seems like an easy safeguard against some of the problems people face with agents.

gurachek•1h ago
The examples in the article are all big scary wipes, But I think the more common damage is way smaller and harder to notice.

I've been using claude code daily for months and the worst thing that happened wasnt a wipe(yet). It needed to save an svg file so it created a /public/blog/ folder. Which meant Apache started serving that real directory instead of routing /blog. My blog just 404'd and I spent like an hour debugging before I figured it out. Nothing got deleted and it's not a permission problem, the agent just put a file in a place that made sense to it.

jai would help with the rm -rf cases for sure but this kind of thing is harder to catch because its not a permissions problem, the agent just doesn't know what a web server is.

cozzyd•1h ago
Should definitely block .ssh reading too...
justinde•58m ago
.claude/settings.json: { "sandbox": { "enabled": true, "filesystem": { "allowRead": ["."], "denyRead": ["~/"], "allowWrite": ["."] } } }

Use it! :) https://code.claude.com/docs/en/sandboxing

charcircuit•49m ago
I want agents to modify the file system. I want them to be able to manage my computer if it thinks it's a good idea. If a build fails due to running out of disk space I want it to be able to find appropriate stuff to delete to free up space.
gonzalohm•49m ago
Not sure I understand the problem. Are people just letting AI do anything? I use Claude Code and it asks for permission to run commands, edit files, etc. No need for sandbox
kristofferR•39m ago
Also recommended:

https://github.com/kenryu42/claude-code-safety-net

Jach•21m ago
I've done some experimenting with running a local model with ollama and claude code connecting to it and having both in a firejail: https://firejail.wordpress.com/ What they get access to is very limited, and mostly whitelisted.
e1g•15m ago
For jailing local agents on a Mac, I made Agent Safehouse - it works for any agent and has many sane default for developers https://agent-safehouse.dev
ray_v•12m ago
I'm wondering if the obvious (and stated) fact that the site was vibe-coded - detracts from the fact that this tool was hand written.

> jai itself was hand implemented by a Stanford computer science professor with decades of C++ and Unix/linux experience. (https://jai.scs.stanford.edu/faq.html#was-jai-written-by-an-...)

rsyring•10m ago
I've been reviewing Agent sandboxing solutions recently and it occurred to me there is a gaping vector for persistent exploits for tools that let the agent write to the project directory. Like this one does.

I had originally thought this would ok as we could review everything in the git diff. But, it later occurred to me that there are all kinds of files that the agent could write to that I'd end up executing, as the developer, outside the sandbox. Every .pyc file for instance, files in .venv , .git hook files.

ChatGPT[1] confirms the underlying exploit vectors and also that there isn't much discussion of them in the context of agent sandboxing tools.

My conclusion from that is the only truly safe sandboxing technique would be one that transfers files from the sandbox to the dev's machine through some kind of git patch or similar. I.e. the file can only transfer if it's in version control and, therefore presumably, has been reviewed by the dev before transfer outside the sandbox.

I'd really like to see people talking more about this. The solution isn't that hard, keep CWD as an overlay and transfer in-container modified files through a proxy of some kind that filters out any file not in git and maybe some that are but are known to be potentially dangerous (bin files). Obviously, there would need to be some kind of configuration option here.

1: https://chatgpt.com/share/69c3ec10-0e40-832a-b905-31736d8a34...

Don't YOLO your file system

https://jai.scs.stanford.edu/
78•mazieres•2h ago•42 comments

Make macOS consistently bad (unironically)

https://lr0.org/blog/p/macos/
318•speckx•7h ago•226 comments

Sports Betting Is Everywhere, Especially on Credit Reports

https://libertystreeteconomics.newyorkfed.org/2026/03/sports-betting-is-everywhere-especially-on-...
20•m-hodges•2d ago•9 comments

Fear and denial in Silicon Valley over social media addiction trial

https://www.bbc.com/news/articles/c86e3eglv2go
76•1659447091•1h ago•90 comments

AMD's Ryzen 9 9950X3D2 Dual Edition crams 208MB of cache into a single chip

https://arstechnica.com/gadgets/2026/03/amds-ryzen-9-9950x3d2-dual-edition-crams-208mb-of-cache-i...
7•zdw•55m ago•0 comments

LG's new 1Hz display is the secret behind a new laptop's battery life

https://www.pcworld.com/article/3096432/lgs-new-1hz-display-is-the-secret-behind-a-new-laptops-ba...
145•robotnikman•4d ago•77 comments

Colorado House passes bill to limit surveillance pricing and wage setting

https://coloradonewsline.com/briefs/surveillance-pricing-wage-setting/
65•jprs•7h ago•7 comments

Improving Composer through real-time RL

https://cursor.com/blog/real-time-rl-for-composer
59•ingve•1d ago•13 comments

Anatomy of the .claude/ folder

https://blog.dailydoseofds.com/p/anatomy-of-the-claude-folder
391•freedomben•12h ago•194 comments

Show HN: Twitch Roulette – Find live streamers who need views the most

https://twitchroulette.net/
61•ellg•4h ago•34 comments

Nashville library launches Memory Lab for digitizing home movies

https://www.axios.com/local/nashville/2026/03/16/nashville-library-digitize-home-movies
112•toomuchtodo•3d ago•29 comments

Velxio 2.0 – Emulate Arduino, ESP32, and Raspberry Pi 3 in the Browser

https://github.com/davidmonterocrespo24/velxio
98•dmcrespo•6h ago•26 comments

ISBN Visualization

https://annas-archive.gd/isbn-visualization?
102•Cider9986•7h ago•16 comments

Telnyx package compromised on PyPI

https://telnyx.com/resources/telnyx-python-sdk-supply-chain-security-notice-march-2026
91•ramimac•18h ago•99 comments

The Future of SCIP

https://sourcegraph.com/blog/the-future-of-scip
44•jdorfman•11h ago•16 comments

Installing a Let's Encrypt TLS certificate on a Brother printer with Certbot

https://owltec.ca/Other/Installing+a+Let%27s+Encrypt+TLS+certificate+on+a+Brother+printer+automat...
192•8organicbits•13h ago•49 comments

Fets and Crosses: Tic-Tac-Toe built from 2458 discrete transistors

https://schilk.co/projects/fetsncrosses/
24•voxadam•3d ago•6 comments

DOJ confirms FBI Director Kash Patel's personal email was hacked

https://arstechnica.com/tech-policy/2026/03/doj-confirms-fbi-director-kash-patels-personal-email-...
211•sebastian_z•5h ago•112 comments

Meow.camera

https://meow.camera/#4258783365322591678
203•surprisetalk•12h ago•51 comments

Explore the Hidden World of Sand

https://magnifiedsand.com/
188•RAAx707•4d ago•35 comments

‘Energy independence feels practical’: Europeans building mini solar farms

https://www.euronews.com/2026/03/26/suddenly-energy-independence-feels-practical-europeans-are-bu...
227•vrganj•18h ago•219 comments

Building FireStriker: Making Civic Tech Free

https://firestriker.org/blog/building-firestriker-why-im-making-civic-tech-free
97•noleary•1d ago•23 comments

Embracing Bayesian methods in clinical trials

https://jamanetwork.com/journals/jama/fullarticle/2847011
86•nextos•4d ago•9 comments

People inside Microsoft are fighting to drop mandatory Microsoft Account

https://www.windowscentral.com/microsoft/windows-11/people-inside-microsoft-are-fighting-to-drop-...
545•breve•13h ago•413 comments

Desk for people who work at home with a cat

https://soranews24.com/2026/03/27/japan-now-has-a-special-desk-for-people-who-work-at-home-with-a...
351•zdw•11h ago•130 comments

Type Construction and Cycle Detection

https://go.dev/blog/type-construction-and-cycle-detection
7•commotionfever•3d ago•0 comments

Capability-Based Security for Redox: Namespace and CWD as Capabilities

https://www.redox-os.org/news/nlnet-cap-nsmgr-cwd/
34•ejplatzer•8h ago•4 comments

Tell HN: Firefox is being slowly deprecated by the industry

17•gurjeet•1h ago•11 comments

Automatically generate all 3D print files for organizing a drawer

https://geniecrate.com/
28•woktalk•2d ago•19 comments

Ask HN: Founders of estonian e-businesses – is it worth it?

102•udl•3d ago•53 comments