PLAYGROUND
Sandbox creator and manager that creates safe environments to run Code, Scripts and Applications.
ubuntu-vm).4096 for Ubuntu desktop. Minimum 2048.2 or 4. More cores = faster install.data\\vms\\ubuntu.qcow2.40–60 GB for Ubuntu desktop.C:\\Users\\camea\\Downloads\\ubuntu-22.04.5-desktop-amd64.iso.Sandbox tutorial (how and why)
What is a sandbox?
A sandbox is a controlled environment for running apps and commands with limits. It helps reduce risk by containing files, limiting resources, and keeping behavior predictable.
Why use it?
Use sandboxes to test tools, scripts, or apps safely. You can lock the working directory, scrub the environment, and set CPU/memory/time limits.
Quick start
- Click New Sandbox and set a working directory.
- Set limits and network preference.
- Click Test Sandbox to run a safe echo.
Key concepts
- Workdir lock keeps runs inside the folder you choose.
- Env scrub removes sensitive environment variables.
- Limits cap time and memory (CPU is advisory).
Hardening (optional)
Enable OS hardening to use stronger isolation when supported. On Windows we use Job Objects; on Linux/macOS it uses firejail or sandbox-exec if installed.
Example app: OND.AU Text Editor
Coming soon. This will be a small text editor used as a safe demo app in the sandbox runner. For now, use the Test Sandbox button.
echo ond.au editorContainer tutorial + controls (Docker)
How it works
This manager talks to your local Docker Engine using the open-source Docker CLI. It does not pull images from the internet unless you run docker pull yourself.
Required
Install Docker Engine (Community) and ensure docker.exe is in PATH. Containers run locally and offline.
Controls
- Create container (docker create)
- Start/Stop container (docker start/stop)
- Delete container (docker rm)
- Rename (docker rename)
- Logs (docker logs)
- Exec (docker exec)
- Attach (read-only logs)
- Compose up/down (docker compose)
- Import/Export images (docker load/save)
- List images and containers
- Ports, env vars, volumes, limits
Command reference
Licensing
This tool uses Docker Engine (Community) / Moby and the Docker CLI, which are open source. No proprietary online services are required.
Baseline isolation
Process isolation, env scrub, workdir lock, time and memory limits, optional network off.
OS hardening later
Linux: bubblewrap/firejail. macOS: sandbox-exec. Windows: Job Objects/AppContainer.
Run API
runCommandInSandbox(id, command, args, options) -> stream output to UI.