Agent Sandbox For Mac

Ash is a macOS sandbox that uses kernel-level security to restrict AI coding agents. It limits access to files, networks, processes, and environment variables. It runs in userspace, no VM necessary.

$ ash run -- claude --dangerously-skip-permissions

Problem

Coding agents access your files, network, and shell to be useful. This access creates risk. An agent may accidentally or maliciously destroy sensitive documents, exfiltrate data, or execute unexpected commands.

Solution

Ash sandboxes agents via macOS Endpoint Security and Network Extension frameworks. You define the files, sites, processes, and arguments an agent can use. Ash keeps the agent, and all its subprocesses, out of everything else.

Fine-Grained Security Controls

Filesystem

Restrict files and directories that an agent can read, write, create, delete, or rename

Network

Allow or deny network connections by host, port, transport protocol, and direction

Process Execution

Limit the processes that agents can run, and the arguments they are called with

ENV Variables

Control environment variables that are passed to sandboxed processes

How It Works

1

Define a Policy

Write a YAML policy file specifying what the agent can access.

2

Launch with Ash

Run your AI agent through Ash using a simple CLI command.

3

Enforce Boundaries

Ash monitors and enforces your policy at the kernel level using macOS security frameworks.

Example Policy

# policy.yml
schema_version: 1

files:
  rules:
    - path: ./**
    - path: ~/.config/**
      operations: [read]

network:
  rules:
    - host: api.goodagent.ai
    - host: "**.github.com"

exec:
  rules:
    - path: git
    - path: /usr/bin/**