OPEN_SOURCE ↗
REDDIT · REDDIT// 17d agoOPENSOURCE RELEASE
DockCode isolates OpenCode inside sandboxed VM
DockCode wraps OpenCode in a Dockerized setup that sends shell commands into a separate Ubuntu 24.04 VM over SSH. The result is a roomy agent environment with a hard boundary around your host and the OpenCode server itself.
// ANALYSIS
This is the right fix for agent overreach: give the model a disposable machine, not another permission dialog.
- –The split is clean: a keygen init container, `opencode-server`, and `opencode-vm` keep SSH auth, the control plane, and execution separated.
- –It meaningfully reduces blast radius, because the agent can't reach the host filesystem, Docker socket, or OpenCode config.
- –The VM is intentionally permissive, so DockCode is containment, not least-privilege hardening; that's a good trade for power users but not a silver bullet.
- –Docker is already pushing its own OpenCode sandbox story, so DockCode's edge will come from UX, self-hostability, and how easy it is to customize.
- –The shared workspace is a practical compromise: the host can inspect and edit files while the agent still gets a writable Linux environment.
// TAGS
dockcodeopen-sourceself-hostedagentclidevtoolsafety
DISCOVERED
17d ago
2026-03-26
PUBLISHED
17d ago
2026-03-25
RELEVANCE
8/ 10
AUTHOR
Concealed10