| ▲ | Finbarr 17 hours ago | |||||||
The docker compose stack for the applications is spun up on the host. The agents have access to the docker socket which means they can talk to docker from inside their sandbox and spin up new sibling containers on the host. Yolobox isn’t designed for full isolation- just accidental commands you wouldn’t want to run on the host, and a convenient way of giving agents a customizable environment they control. Early on in development I tried to harden the container to prevent deliberate escapes by the agent. This was a waste of time as the agents just kept finding more and more exploits when I asked them to try and break out. | ||||||||
| ▲ | CodesInChaos 16 hours ago | parent | next [-] | |||||||
So the right way to use yolobox is to spin up one VM as a secure sandbox, and then use yolobox to separate individual agents within the VM? | ||||||||
| ||||||||
| ▲ | CodesInChaos 16 hours ago | parent | prev [-] | |||||||
Sounds interesting. What kind of exploits did they find, apart from docker being exposed? | ||||||||
| ||||||||