| ▲ | felixrieseberg 3 hours ago | ||||||||||||||||||||||||||||||||||
Hi, Felix from Anthropic here. I work on Claude Cowork and Claude Code. Claude Cowork uses the Claude Code agent harness running inside a Linux VM (with additional sandboxing, network controls, and filesystem mounts). We run that through Apple's virtualization framework or Microsoft's Host Compute System. This buys us three things we like a lot: (1) A computer for Claude to write software in, because so many user problems can be solved really well by first writing custom-tailored scripts against whatever task you throw at it. We'd like that computer to not be _your_ computer so that Claude is free to configure it in the moment. (2) Hard guarantees at the boundary: Other sandboxing solutions exist, but for a few reasons, none of them satisfy as much and allow us to make similarly sound guarantees about what Claude will be able to do and not to. (3) As a product of 1+2, more safety for non-technical users. If you're reading this, you're probably equipped to evaluate whether or not a particular script or command is safe to run - but most humans aren't, and even the ones who are so often experience "approval fatigue". Not having to ask for approval is valuable. It's a real trade-off though and I'm thankful for any feedback, including this one. We're reading all the comments and have some ideas on how to maybe make this better - for people who don't want to use Cowork at all, who don't want it inside a VM, or who just want a little bit more control. Thank you! | |||||||||||||||||||||||||||||||||||
| ▲ | aberoham 14 minutes ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
Claude Cowork grabs local DNS resolution on macOS which conflicts with secure web gateway aka ZTNA aka SASE products such as Cloudflare Warp which do similar. The work-around is to close Cowork, let Warp grab mDNSResponder's attention first, then restart Claude Desktop, or some similar special ordering sequence. It's annoying, but you could say that about everything having to do with MITM middleboxes. | |||||||||||||||||||||||||||||||||||
| ▲ | baconner 3 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
FWIW I think many of us would actually very much love to have an official (or semi official) Claude sandboxing container image base / vm base. I wonder if you all have considered making something like the cowork vm available for that? | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | beej71 3 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
I think these are are excellent points, but the complaint talks about significant performance and power issues. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | exabrial 2 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
Felix, is there any way you guys could fix this simple, but absolutely terribly annoying bug? Claude mangles XML files with <name> as an XML Tag to <n> | |||||||||||||||||||||||||||||||||||
| ▲ | radicality 3 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
I tried to use it right after launch from within Claude Desktop, on a Mac VM running within UTM, and got cryptoc messages about Apple virtualization framework. That made me realize it wants to also run a Apple virtualization VM but can’t since it’s inside one already - imo the error messaging here could be better, or considering that it already is in a VM, it could perhaps bypass the vm altogether. Because right now I still never got to try cowork because of this error. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | quinncom 2 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
I accidentally clicked the Claude Cowork button inside the Claude desktop app. I never used it. I didn't notice anything at the time, but a week later I discovered the huge VM file on my disk. It would be really nice to ask the user, “Are you sure you want to use Cowork, it will download and install a huge VM on your disk.” | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | consumer451 2 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
Any chance you guys could get the Claude Desktop installer fixed on Windows? It currently requires users to turn on "developer mode." Sorry for the ask here, but unaware of other avenues of support as the tickets on the Claude Code repo keep getting closed, as it is not a CC issue. https://github.com/anthropics/claude-code/issues/26457https:... | |||||||||||||||||||||||||||||||||||
| ▲ | ukuina 3 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
Can you allow placing the VM on an external disk? Also, please allow Cowork to work on directories outside the homedir! | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | tyfon 2 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
It would be really nice to have an option to not do this since a ton of companies deny VMs in their group policies. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | bachittle 3 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
Do you think it would be possible in the future to maybe add developer settings to enable or disable certain features, or to switch to other sandboxing methods that are more lightweight like Apple seatbelt for example? | |||||||||||||||||||||||||||||||||||
| ▲ | flatline 3 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
There's a lot that's not being said in (2). That warrants more extensive justification, especially with the issues presented in the parent post. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | Terretta an hour ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
> real trade-off … thankful for any feedback Speaking as a tiny but regulated SMB that's dabbling in skill plugins with Cowork: we strongly appreciate and support this stance. We hope you don't relax your standards, and need you not to. We strongly agree with (1), (2), and (3). If working outside the sandbox becomes available, Cowork becomes a more interesting exfil vector. A vbox should also be able to be made non-optional — even if MDM allows users to elevate privileges. We've noticed you're making other interesting infosec tradeoffs too. Your M365 connector aggressively avoids enumeration, which we figured was intentional as a seatbelt for keeping looky-loos in their lane.* Caring about foot-guns goes a long way in giving a sense of you being responsible. Makes it feel less irresponsible to wade in. In the 'thankful for feedback' spirit, here's a concrete UX gap: we agree approval fatigue matters, and we appreciate your team working to minimize prompts. But the converse is, when a user rejects a prompt — or it ends up behind a window — there's no clear way to re-trigger. Claude app can silently fail or run forever when it can't spin up the workspace, wasn't allowed to install Python, or was told it can't read M365 data. Employees who've paid attention to their cyber training (reasonably!) click "No" and then they're stuck without diagnostics or breadcrumbs. For a CLI example of this done well, see `m365-cli`'s `auth` and `doctor` commands. The tool supports both interactive and script modes through config (backed by a setup wizard): https://pnp.github.io/cli-microsoft365/cmd/cli/cli-doctor/ Similarly, first party MCPs may run but be invisible to Cowork. Show it its own logs and it says "OK, yes, that works but I still can't see it, maybe just copy and paste your context for now." A doctor tool could send the user to a help page or tell them how to reinstall. Minimal diagnostics for managed machines — running without local admin but able to be elevated if needed — would go a long way for the SMBs that want to deploy this responsibly. Maybe a resync perms button or Settings or Help Menu item that calls cowork's own doctor cli when invoked? --- * When given IDs, the connector can read anything the user can anyway. We're able to do everything we need, just had to ship ID signposts in our skill plugin that taps your connector. Preferred that hack over a third party MCP or CLI, thanks to the responsibility you look to be iteratively improving. | |||||||||||||||||||||||||||||||||||
| ▲ | 3 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
| [deleted] | |||||||||||||||||||||||||||||||||||
| ▲ | rvz 2 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
> (2) Hard guarantees at the boundary: Other sandboxing solutions exist, but for a few reasons, none of them satisfy as much and allow us to make similarly sound guarantees about what Claude will be able to do and not to. This is the most interesting requirement. So all the sandbox solutions that were recently developed all over GitHub, fell short of your expectations? This is half surprising since many people were using AI to solve the sandboxing issue have claimed to have done so over several months and the best we have is Apple containers. What were the few reasons? Surely there has to be some strict requirement for that everyone else is missing. But still having a 10 GB claude.vmbundle doesn't make any sense. | |||||||||||||||||||||||||||||||||||
| ▲ | xvector 3 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
Cowork has been an insane productivity boost, it is actually amazing. Thank you! | |||||||||||||||||||||||||||||||||||
| ▲ | jccx70 3 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
[dead] | |||||||||||||||||||||||||||||||||||