sandbox-runnerExecute untrusted code in Firecracker microVM sandboxes โ sub-200ms boot, isolated kernel, auto-cleanup
No threats detected by VirusTotal scanners
Review tool descriptions for hidden instructions
Pin tool versions and review updates before upgrading
Apply principle of least privilege per tool
Can make outbound network requests. A compromised tool can exfiltrate stolen data, download additional payloads, or communicate with command-and-control servers.
Can execute arbitrary system commands on your machine. A compromised tool with shell access can install malware, modify system files, or exfiltrate data.
No reviews yet. Be the first to review!
swarm-orchestratorMulti-agent coordination with permission-controlled task delegation
memory-managerPersistent memory with vector search for long-term agent context
tool-builderCreate custom tools and skills dynamically at runtime
agent-monitorReal-time dashboard for monitoring agent activities and resource usage