-
Prompt injection: Malicious users can craft messages that trick the agent into running unintended commands. Smaller models are more susceptible. Mitigate by enabling sandbox mode and restricting tool access for channels that accept messages from untrusted or unknown senders.
-
Sandbox: Docker-based isolation runs tool execution in a container, protecting your host system. Set
sandbox.modetonon-main(sandbox everyone except your main session) orall(sandbox everything). Usesandbox.scopeto control container lifecycle (session,agent, orshared) andworkspaceAccessto limit file access (none,ro,rw). -
Tool policy: Use
tools.denyto block dangerous tools (likeexec,process,browser) for agents handling untrusted input. Elevated mode bypasses the sandbox and runs on the host—never grant it to unknown senders. -
Browser control: The browser tool can navigate to any URL and interact with pages, making it high-risk for automation attacks. Restrict browser access by channel or sender allowlist. When possible, use the sandboxed browser to limit exposure.
