BACK_TO_FEEDAICRIER_2
DockCode isolates OpenCode inside sandboxed VM
OPEN_SOURCE ↗
REDDIT · REDDIT// 17d agoOPENSOURCE RELEASE

DockCode isolates OpenCode inside sandboxed VM

DockCode wraps OpenCode in a Dockerized setup that sends shell commands into a separate Ubuntu 24.04 VM over SSH. The result is a roomy agent environment with a hard boundary around your host and the OpenCode server itself.

// ANALYSIS

This is the right fix for agent overreach: give the model a disposable machine, not another permission dialog.

  • The split is clean: a keygen init container, `opencode-server`, and `opencode-vm` keep SSH auth, the control plane, and execution separated.
  • It meaningfully reduces blast radius, because the agent can't reach the host filesystem, Docker socket, or OpenCode config.
  • The VM is intentionally permissive, so DockCode is containment, not least-privilege hardening; that's a good trade for power users but not a silver bullet.
  • Docker is already pushing its own OpenCode sandbox story, so DockCode's edge will come from UX, self-hostability, and how easy it is to customize.
  • The shared workspace is a practical compromise: the host can inspect and edit files while the agent still gets a writable Linux environment.
// TAGS
dockcodeopen-sourceself-hostedagentclidevtoolsafety

DISCOVERED

17d ago

2026-03-26

PUBLISHED

17d ago

2026-03-25

RELEVANCE

8/ 10

AUTHOR

Concealed10