Secure Sandboxes are isolated execution environments where agents perform hands-on security work. Every time a task requires running commands, executing scripts, fetching URLs, compiling proof-of-concepts, or performing reconnaissance, the agent operates within a sandboxed environment to ensure safety, reproducibility, and controlled execution.
When an agent needs to perform an action, here’s what happens:
Environment initialization: A fresh sandbox environment spins up with the necessary tools and dependencies
Credential injection: Environment variables and secrets you’ve defined are securely injected into the sandbox process at runtime, never written to disk
Task execution: The agent runs commands, scripts, or tools within the isolated environment
Live streaming: Output, logs, and progress are streamed back to you in real-time as the task executes
Artifact capture: All generated files, reports, screenshots, and evidence are automatically saved
Cleanup: The ephemeral sandbox environment is destroyed after execution completes
While the sandbox environment itself is ephemeral and destroyed after each run, all generated files and artifacts are persisted to a dedicated storage layer that runs alongside the sandbox. This persistent disk ensures:
File continuity: Every file created during execution (scan results, reports, screenshots, logs, compiled binaries) is automatically saved to persistent storage
Cross-task access: Files generated in one task remain available for future tasks, enabling agents to build on previous work
Evidence preservation: Complete audit trails and artifacts from security assessments are retained for review, reporting, and compliance
Workspace persistence: Your agent’s workspace maintains state across executions, so context and results accumulate over time
This architecture gives you the security benefits of ephemeral, isolated execution while maintaining the practical benefits of persistent storage for all your security artifacts and findings.