Multi-Agent Sandbox

ReviewAudited by ClawScan on May 18, 2026.

Overview

The guide is coherent for building a sandbox, but it creates persistent bridges and broad agent/session permissions that could expose the local gateway, shared VPS, or conversation data if not tightly scoped.

Review this carefully before using it. If you install it, restrict agent allowlists to named agents, avoid wildcard main-agent access, disable session history/spawn tools unless necessary, use dedicated low-privilege Discord and SSH credentials, and verify that the socat bridges are authenticated, firewalled, and removed when no longer needed.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A sandboxed agent or process could potentially reach local gateway functionality over the network rather than through the declared tool permissions.

Why it was flagged

The sandbox denies the gateway tool, but the setup also exposes the local gateway port to Docker containers while allowing sandbox exec/process. If the gateway endpoint is sensitive and not separately authenticated or scoped, this can weaken the intended tool boundary.

Skill content
"allow": ["exec", "process", ...] ... "deny": ["gateway", ...] ... ExecStart=/usr/bin/socat TCP-LISTEN:18789,bind=172.17.0.1,... TCP:127.0.0.1:18789
Recommendation

Only create the gateway bridge if it is required, ensure the gateway endpoint is authenticated, restrict access to the intended container or network, and document exactly what the bridged port permits.

What this means

Conversation history, workspace context, or private agent data could be exposed across agents, Discord, or a shared VPS if permissions are broader than intended.

Why it was flagged

The configuration enables broad inter-agent communication, session listing/history access, and a wildcard outbound allowlist for the main agent. This is aligned with collaboration, but the visible instructions do not fully define data boundaries or review requirements for session history and cross-agent forwarding.

Skill content
"agentToAgent": { "allow": ["*"] } ... `main-agent → anyone` ✅ ... "alsoAllow": ["message", "sessions_send", "sessions_list", "sessions_history"]
Recommendation

Limit agentToAgent allowlists to named agents, disable sessions_history/sessions_spawn unless required, keep shared workspaces free of secrets, and add explicit approval rules for sending sensitive content.

What this means

The network bridges remain active until the user disables or removes the services.

Why it was flagged

The setup creates persistent systemd services that automatically restart. This is disclosed and purpose-aligned for infrastructure, but it means the bridges keep operating after the initial setup.

Skill content
Restart=always ... sudo systemctl enable --now socat-bridge-docker0-gateway socat-bridge-docker0-vps-ssh
Recommendation

Track the created service units, disable them when no longer needed, and add cleanup instructions before using this in a sensitive environment.

What this means

Misconfigured or overprivileged tokens and SSH/Tailscale access could let sandbox agents affect accounts or infrastructure beyond the intended sandbox.

Why it was flagged

The skill expects users to provision Discord bot tokens, Tailscale access, and VPS/SSH access. These credentials are expected for the stated integration and there is no evidence of credential exfiltration, but they are sensitive authorities.

Skill content
- A Discord bot token per sandbox agent ... - A shared VPS accessible via Tailscale
Recommendation

Use dedicated low-privilege Discord bots, separate SSH keys, restricted VPS accounts, and avoid storing secrets in the shared workspace.