BACK_TO_FEEDAICRIER_2
aigate drops kernel sandbox for AI agents
OPEN_SOURCE ↗
REDDIT · REDDIT// 36d agoOPENSOURCE RELEASE

aigate drops kernel sandbox for AI agents

aigate is an open-source CLI that sandboxes Claude Code, Cursor, Copilot, Aider, and similar local coding agents at the OS level instead of trusting app-level permission prompts. It blocks secret reads, dangerous commands, unwanted network egress, and runaway resource usage with ACLs, namespaces, and cgroups across Linux, macOS, and WSL.

// ANALYSIS

This is a smart response to the biggest unresolved problem in local AI tooling: the model is not the security boundary, the kernel is. If aigate works reliably in practice, it turns AI-agent safety from “please behave” into enforceable policy.

  • The pitch is unusually concrete: deny reads on `.env`, `secrets/`, and `*.pem`, then block `curl`, `wget`, and `ssh` before the agent ever gets a chance to exfiltrate anything
  • It targets real developer workflows by wrapping existing tools instead of asking teams to switch editors or agent stacks
  • Linux support looks strongest, with mount namespaces, network namespaces, and cgroups v2 giving it more than just file-level protection
  • The open-source angle matters here because developers can inspect the enforcement model instead of trusting another opaque security layer
  • The main question is adoption friction: anything that needs `sudo` setup and OS-specific primitives has to be dead simple or most developers will fall back to weaker defaults
// TAGS
aigateclidevtoolai-codingopen-sourcesafety

DISCOVERED

36d ago

2026-03-06

PUBLISHED

36d ago

2026-03-06

RELEVANCE

8/ 10

AUTHOR

oldestaxe