Add Hazmat to Security Tools#1999
Open
dredozubov wants to merge 1 commit intojaywcjlove:masterfrom
Open
Conversation
macOS containment for AI coding agents: separate UID, Seatbelt sandboxing via sandbox_init(), PF anchors, DNS blocklists, backup/ rollback. TLA+-checked design.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Adding Hazmat under Security Tools.
Hazmat contains AI/coding agents on macOS. The agent runs under its own UID (not the operator's), under a Seatbelt policy applied via
sandbox_init()from a small privileged helper (notsandbox-exec), with PF anchors and DNS blocklists for per-session network policy, plus backup/rollback for reversible host setup.The design is checked in TLA+ across nine specs (~44,795 states) covering setup/rollback ordering, seatbelt policy, backup safety, version migration, Tier 2/Tier 3 policy equivalence, session-time host permission repairs, harness lifecycle, and helper fd hygiene before
sandbox_init.Useful for developers running Claude Code / Codex / similar coding agents on a daily-driver Mac where generated code would otherwise inherit normal user authority.
https://github.com/dredozubov/hazmat