Install
openclaw skills install agent-securitysandboxExecute untrusted code or commands in a secure, isolated Docker environment. Use when asked to run unknown scripts, third-party skills, or any code that might pose a security risk to the host system.
openclaw skills install agent-securitysandboxThis skill provides a secure "clean room" for executing and monitoring untrusted commands and code. It uses Docker with restricted capabilities, no network access, and a custom seccomp profile to isolate the execution from your host system.
Determine if the command or script you are asked to run should be sandboxed.
Use the mass script located in the skill's scripts/ directory to wrap the command.
Usage:
./scripts/mass "<command>"
Example: To run a suspicious Python script:
./scripts/mass "python3 untrusted_script.py"
The mass tool will return the stdout and stderr from the sandbox. If the command was blocked by security policies (e.g., trying to access sensitive files or making network calls), the output will reflect the failure.
--cap-drop=ALL).--network=none).sandboxuser.seccomp.json.--rm).Dockerfile are available.