mirror of
https://github.com/NousResearch/hermes-agent.git
synced 2026-04-28 23:11:37 +08:00
Compare commits
1 Commits
opencode-p
...
fix/docker
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
b54591ddda |
@@ -107,6 +107,12 @@ terminal:
|
|||||||
# timeout: 180
|
# timeout: 180
|
||||||
# lifetime_seconds: 300
|
# lifetime_seconds: 300
|
||||||
# docker_image: "nikolaik/python-nodejs:python3.11-nodejs20"
|
# docker_image: "nikolaik/python-nodejs:python3.11-nodejs20"
|
||||||
|
# # Optional: explicitly forward selected env vars into Docker.
|
||||||
|
# # These values come from your current shell first, then ~/.hermes/.env.
|
||||||
|
# # Warning: anything forwarded here is visible to commands run in the container.
|
||||||
|
# docker_forward_env:
|
||||||
|
# - "GITHUB_TOKEN"
|
||||||
|
# - "NPM_TOKEN"
|
||||||
|
|
||||||
# -----------------------------------------------------------------------------
|
# -----------------------------------------------------------------------------
|
||||||
# OPTION 4: Singularity/Apptainer container
|
# OPTION 4: Singularity/Apptainer container
|
||||||
|
|||||||
2
cli.py
2
cli.py
@@ -158,6 +158,7 @@ def load_cli_config() -> Dict[str, Any]:
|
|||||||
"timeout": 60,
|
"timeout": 60,
|
||||||
"lifetime_seconds": 300,
|
"lifetime_seconds": 300,
|
||||||
"docker_image": "python:3.11",
|
"docker_image": "python:3.11",
|
||||||
|
"docker_forward_env": [],
|
||||||
"singularity_image": "docker://python:3.11",
|
"singularity_image": "docker://python:3.11",
|
||||||
"modal_image": "python:3.11",
|
"modal_image": "python:3.11",
|
||||||
"daytona_image": "nikolaik/python-nodejs:python3.11-nodejs20",
|
"daytona_image": "nikolaik/python-nodejs:python3.11-nodejs20",
|
||||||
@@ -313,6 +314,7 @@ def load_cli_config() -> Dict[str, Any]:
|
|||||||
"timeout": "TERMINAL_TIMEOUT",
|
"timeout": "TERMINAL_TIMEOUT",
|
||||||
"lifetime_seconds": "TERMINAL_LIFETIME_SECONDS",
|
"lifetime_seconds": "TERMINAL_LIFETIME_SECONDS",
|
||||||
"docker_image": "TERMINAL_DOCKER_IMAGE",
|
"docker_image": "TERMINAL_DOCKER_IMAGE",
|
||||||
|
"docker_forward_env": "TERMINAL_DOCKER_FORWARD_ENV",
|
||||||
"singularity_image": "TERMINAL_SINGULARITY_IMAGE",
|
"singularity_image": "TERMINAL_SINGULARITY_IMAGE",
|
||||||
"modal_image": "TERMINAL_MODAL_IMAGE",
|
"modal_image": "TERMINAL_MODAL_IMAGE",
|
||||||
"daytona_image": "TERMINAL_DAYTONA_IMAGE",
|
"daytona_image": "TERMINAL_DAYTONA_IMAGE",
|
||||||
|
|||||||
@@ -64,6 +64,7 @@ if _config_path.exists():
|
|||||||
"timeout": "TERMINAL_TIMEOUT",
|
"timeout": "TERMINAL_TIMEOUT",
|
||||||
"lifetime_seconds": "TERMINAL_LIFETIME_SECONDS",
|
"lifetime_seconds": "TERMINAL_LIFETIME_SECONDS",
|
||||||
"docker_image": "TERMINAL_DOCKER_IMAGE",
|
"docker_image": "TERMINAL_DOCKER_IMAGE",
|
||||||
|
"docker_forward_env": "TERMINAL_DOCKER_FORWARD_ENV",
|
||||||
"singularity_image": "TERMINAL_SINGULARITY_IMAGE",
|
"singularity_image": "TERMINAL_SINGULARITY_IMAGE",
|
||||||
"modal_image": "TERMINAL_MODAL_IMAGE",
|
"modal_image": "TERMINAL_MODAL_IMAGE",
|
||||||
"daytona_image": "TERMINAL_DAYTONA_IMAGE",
|
"daytona_image": "TERMINAL_DAYTONA_IMAGE",
|
||||||
|
|||||||
@@ -106,6 +106,7 @@ DEFAULT_CONFIG = {
|
|||||||
"cwd": ".", # Use current directory
|
"cwd": ".", # Use current directory
|
||||||
"timeout": 180,
|
"timeout": 180,
|
||||||
"docker_image": "nikolaik/python-nodejs:python3.11-nodejs20",
|
"docker_image": "nikolaik/python-nodejs:python3.11-nodejs20",
|
||||||
|
"docker_forward_env": [],
|
||||||
"singularity_image": "docker://nikolaik/python-nodejs:python3.11-nodejs20",
|
"singularity_image": "docker://nikolaik/python-nodejs:python3.11-nodejs20",
|
||||||
"modal_image": "nikolaik/python-nodejs:python3.11-nodejs20",
|
"modal_image": "nikolaik/python-nodejs:python3.11-nodejs20",
|
||||||
"daytona_image": "nikolaik/python-nodejs:python3.11-nodejs20",
|
"daytona_image": "nikolaik/python-nodejs:python3.11-nodejs20",
|
||||||
@@ -302,7 +303,7 @@ DEFAULT_CONFIG = {
|
|||||||
},
|
},
|
||||||
|
|
||||||
# Config schema version - bump this when adding new required fields
|
# Config schema version - bump this when adding new required fields
|
||||||
"_config_version": 8,
|
"_config_version": 9,
|
||||||
}
|
}
|
||||||
|
|
||||||
# =============================================================================
|
# =============================================================================
|
||||||
|
|||||||
@@ -1,4 +1,5 @@
|
|||||||
import logging
|
import logging
|
||||||
|
from io import StringIO
|
||||||
import subprocess
|
import subprocess
|
||||||
|
|
||||||
import pytest
|
import pytest
|
||||||
@@ -86,3 +87,64 @@ def test_ensure_docker_available_uses_resolved_executable(monkeypatch):
|
|||||||
})
|
})
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
|
class _FakePopen:
|
||||||
|
def __init__(self, cmd, **kwargs):
|
||||||
|
self.cmd = cmd
|
||||||
|
self.kwargs = kwargs
|
||||||
|
self.stdout = StringIO("")
|
||||||
|
self.stdin = None
|
||||||
|
self.returncode = 0
|
||||||
|
|
||||||
|
def poll(self):
|
||||||
|
return self.returncode
|
||||||
|
|
||||||
|
|
||||||
|
def _make_execute_only_env(forward_env=None):
|
||||||
|
env = docker_env.DockerEnvironment.__new__(docker_env.DockerEnvironment)
|
||||||
|
env.cwd = "/root"
|
||||||
|
env.timeout = 60
|
||||||
|
env._forward_env = forward_env or []
|
||||||
|
env._prepare_command = lambda command: (command, None)
|
||||||
|
env._timeout_result = lambda timeout: {"output": f"timed out after {timeout}", "returncode": 124}
|
||||||
|
env._inner = type("Inner", (), {
|
||||||
|
"container_id": "test-container",
|
||||||
|
"config": type("Cfg", (), {"executable": "/usr/bin/docker", "env": {}})(),
|
||||||
|
})()
|
||||||
|
return env
|
||||||
|
|
||||||
|
|
||||||
|
def test_execute_uses_hermes_dotenv_for_allowlisted_env(monkeypatch):
|
||||||
|
env = _make_execute_only_env(["GITHUB_TOKEN"])
|
||||||
|
popen_calls = []
|
||||||
|
|
||||||
|
def _fake_popen(cmd, **kwargs):
|
||||||
|
popen_calls.append(cmd)
|
||||||
|
return _FakePopen(cmd, **kwargs)
|
||||||
|
|
||||||
|
monkeypatch.delenv("GITHUB_TOKEN", raising=False)
|
||||||
|
monkeypatch.setattr(docker_env, "_load_hermes_env_vars", lambda: {"GITHUB_TOKEN": "value_from_dotenv"})
|
||||||
|
monkeypatch.setattr(docker_env.subprocess, "Popen", _fake_popen)
|
||||||
|
|
||||||
|
result = env.execute("echo hi")
|
||||||
|
|
||||||
|
assert result["returncode"] == 0
|
||||||
|
assert "GITHUB_TOKEN=value_from_dotenv" in popen_calls[0]
|
||||||
|
|
||||||
|
|
||||||
|
def test_execute_prefers_shell_env_over_hermes_dotenv(monkeypatch):
|
||||||
|
env = _make_execute_only_env(["GITHUB_TOKEN"])
|
||||||
|
popen_calls = []
|
||||||
|
|
||||||
|
def _fake_popen(cmd, **kwargs):
|
||||||
|
popen_calls.append(cmd)
|
||||||
|
return _FakePopen(cmd, **kwargs)
|
||||||
|
|
||||||
|
monkeypatch.setenv("GITHUB_TOKEN", "value_from_shell")
|
||||||
|
monkeypatch.setattr(docker_env, "_load_hermes_env_vars", lambda: {"GITHUB_TOKEN": "value_from_dotenv"})
|
||||||
|
monkeypatch.setattr(docker_env.subprocess, "Popen", _fake_popen)
|
||||||
|
|
||||||
|
env.execute("echo hi")
|
||||||
|
|
||||||
|
assert "GITHUB_TOKEN=value_from_shell" in popen_calls[0]
|
||||||
|
assert "GITHUB_TOKEN=value_from_dotenv" not in popen_calls[0]
|
||||||
|
|||||||
@@ -30,6 +30,28 @@ class TestParseEnvVar:
|
|||||||
result = _parse_env_var("TERMINAL_DOCKER_VOLUMES", "[]", json.loads, "valid JSON")
|
result = _parse_env_var("TERMINAL_DOCKER_VOLUMES", "[]", json.loads, "valid JSON")
|
||||||
assert result == ["/host:/container"]
|
assert result == ["/host:/container"]
|
||||||
|
|
||||||
|
def test_get_env_config_parses_docker_forward_env_json(self):
|
||||||
|
with patch.dict("os.environ", {
|
||||||
|
"TERMINAL_ENV": "docker",
|
||||||
|
"TERMINAL_DOCKER_FORWARD_ENV": '["GITHUB_TOKEN", "NPM_TOKEN"]',
|
||||||
|
}, clear=False):
|
||||||
|
config = _tt_mod._get_env_config()
|
||||||
|
assert config["docker_forward_env"] == ["GITHUB_TOKEN", "NPM_TOKEN"]
|
||||||
|
|
||||||
|
def test_create_environment_passes_docker_forward_env(self):
|
||||||
|
fake_env = object()
|
||||||
|
with patch.object(_tt_mod, "_DockerEnvironment", return_value=fake_env) as mock_docker:
|
||||||
|
result = _tt_mod._create_environment(
|
||||||
|
"docker",
|
||||||
|
image="python:3.11",
|
||||||
|
cwd="/root",
|
||||||
|
timeout=180,
|
||||||
|
container_config={"docker_forward_env": ["GITHUB_TOKEN"]},
|
||||||
|
)
|
||||||
|
|
||||||
|
assert result is fake_env
|
||||||
|
assert mock_docker.call_args.kwargs["forward_env"] == ["GITHUB_TOKEN"]
|
||||||
|
|
||||||
def test_falls_back_to_default(self):
|
def test_falls_back_to_default(self):
|
||||||
with patch.dict("os.environ", {}, clear=False):
|
with patch.dict("os.environ", {}, clear=False):
|
||||||
# Remove the var if it exists, rely on default
|
# Remove the var if it exists, rely on default
|
||||||
|
|||||||
@@ -7,6 +7,7 @@ persistence via bind mounts.
|
|||||||
|
|
||||||
import logging
|
import logging
|
||||||
import os
|
import os
|
||||||
|
import re
|
||||||
import shutil
|
import shutil
|
||||||
import subprocess
|
import subprocess
|
||||||
import sys
|
import sys
|
||||||
@@ -30,6 +31,42 @@ _DOCKER_SEARCH_PATHS = [
|
|||||||
]
|
]
|
||||||
|
|
||||||
_docker_executable: Optional[str] = None # resolved once, cached
|
_docker_executable: Optional[str] = None # resolved once, cached
|
||||||
|
_ENV_VAR_NAME_RE = re.compile(r"^[A-Za-z_][A-Za-z0-9_]*$")
|
||||||
|
|
||||||
|
|
||||||
|
def _normalize_forward_env_names(forward_env: list[str] | None) -> list[str]:
|
||||||
|
"""Return a deduplicated list of valid environment variable names."""
|
||||||
|
normalized: list[str] = []
|
||||||
|
seen: set[str] = set()
|
||||||
|
|
||||||
|
for item in forward_env or []:
|
||||||
|
if not isinstance(item, str):
|
||||||
|
logger.warning("Ignoring non-string docker_forward_env entry: %r", item)
|
||||||
|
continue
|
||||||
|
|
||||||
|
key = item.strip()
|
||||||
|
if not key:
|
||||||
|
continue
|
||||||
|
if not _ENV_VAR_NAME_RE.match(key):
|
||||||
|
logger.warning("Ignoring invalid docker_forward_env entry: %r", item)
|
||||||
|
continue
|
||||||
|
if key in seen:
|
||||||
|
continue
|
||||||
|
|
||||||
|
seen.add(key)
|
||||||
|
normalized.append(key)
|
||||||
|
|
||||||
|
return normalized
|
||||||
|
|
||||||
|
|
||||||
|
def _load_hermes_env_vars() -> dict[str, str]:
|
||||||
|
"""Load ~/.hermes/.env values without failing Docker command execution."""
|
||||||
|
try:
|
||||||
|
from hermes_cli.config import load_env
|
||||||
|
|
||||||
|
return load_env() or {}
|
||||||
|
except Exception:
|
||||||
|
return {}
|
||||||
|
|
||||||
|
|
||||||
def find_docker() -> Optional[str]:
|
def find_docker() -> Optional[str]:
|
||||||
@@ -171,6 +208,7 @@ class DockerEnvironment(BaseEnvironment):
|
|||||||
persistent_filesystem: bool = False,
|
persistent_filesystem: bool = False,
|
||||||
task_id: str = "default",
|
task_id: str = "default",
|
||||||
volumes: list = None,
|
volumes: list = None,
|
||||||
|
forward_env: list[str] | None = None,
|
||||||
network: bool = True,
|
network: bool = True,
|
||||||
):
|
):
|
||||||
if cwd == "~":
|
if cwd == "~":
|
||||||
@@ -179,6 +217,7 @@ class DockerEnvironment(BaseEnvironment):
|
|||||||
self._base_image = image
|
self._base_image = image
|
||||||
self._persistent = persistent_filesystem
|
self._persistent = persistent_filesystem
|
||||||
self._task_id = task_id
|
self._task_id = task_id
|
||||||
|
self._forward_env = _normalize_forward_env_names(forward_env)
|
||||||
self._container_id: Optional[str] = None
|
self._container_id: Optional[str] = None
|
||||||
logger.info(f"DockerEnvironment volumes: {volumes}")
|
logger.info(f"DockerEnvironment volumes: {volumes}")
|
||||||
# Ensure volumes is a list (config.yaml could be malformed)
|
# Ensure volumes is a list (config.yaml could be malformed)
|
||||||
@@ -330,8 +369,12 @@ class DockerEnvironment(BaseEnvironment):
|
|||||||
if effective_stdin is not None:
|
if effective_stdin is not None:
|
||||||
cmd.append("-i")
|
cmd.append("-i")
|
||||||
cmd.extend(["-w", work_dir])
|
cmd.extend(["-w", work_dir])
|
||||||
for key in self._inner.config.forward_env:
|
hermes_env = _load_hermes_env_vars() if self._forward_env else {}
|
||||||
if (value := os.getenv(key)) is not None:
|
for key in self._forward_env:
|
||||||
|
value = os.getenv(key)
|
||||||
|
if value is None:
|
||||||
|
value = hermes_env.get(key)
|
||||||
|
if value is not None:
|
||||||
cmd.extend(["-e", f"{key}={value}"])
|
cmd.extend(["-e", f"{key}={value}"])
|
||||||
for key, value in self._inner.config.env.items():
|
for key, value in self._inner.config.env.items():
|
||||||
cmd.extend(["-e", f"{key}={value}"])
|
cmd.extend(["-e", f"{key}={value}"])
|
||||||
|
|||||||
@@ -492,6 +492,7 @@ def _get_env_config() -> Dict[str, Any]:
|
|||||||
return {
|
return {
|
||||||
"env_type": env_type,
|
"env_type": env_type,
|
||||||
"docker_image": os.getenv("TERMINAL_DOCKER_IMAGE", default_image),
|
"docker_image": os.getenv("TERMINAL_DOCKER_IMAGE", default_image),
|
||||||
|
"docker_forward_env": _parse_env_var("TERMINAL_DOCKER_FORWARD_ENV", "[]", json.loads, "valid JSON"),
|
||||||
"singularity_image": os.getenv("TERMINAL_SINGULARITY_IMAGE", f"docker://{default_image}"),
|
"singularity_image": os.getenv("TERMINAL_SINGULARITY_IMAGE", f"docker://{default_image}"),
|
||||||
"modal_image": os.getenv("TERMINAL_MODAL_IMAGE", default_image),
|
"modal_image": os.getenv("TERMINAL_MODAL_IMAGE", default_image),
|
||||||
"daytona_image": os.getenv("TERMINAL_DAYTONA_IMAGE", default_image),
|
"daytona_image": os.getenv("TERMINAL_DAYTONA_IMAGE", default_image),
|
||||||
@@ -536,6 +537,7 @@ def _create_environment(env_type: str, image: str, cwd: str, timeout: int,
|
|||||||
disk = cc.get("container_disk", 51200)
|
disk = cc.get("container_disk", 51200)
|
||||||
persistent = cc.get("container_persistent", True)
|
persistent = cc.get("container_persistent", True)
|
||||||
volumes = cc.get("docker_volumes", [])
|
volumes = cc.get("docker_volumes", [])
|
||||||
|
docker_forward_env = cc.get("docker_forward_env", [])
|
||||||
|
|
||||||
if env_type == "local":
|
if env_type == "local":
|
||||||
return _LocalEnvironment(cwd=cwd, timeout=timeout)
|
return _LocalEnvironment(cwd=cwd, timeout=timeout)
|
||||||
@@ -546,6 +548,7 @@ def _create_environment(env_type: str, image: str, cwd: str, timeout: int,
|
|||||||
cpu=cpu, memory=memory, disk=disk,
|
cpu=cpu, memory=memory, disk=disk,
|
||||||
persistent_filesystem=persistent, task_id=task_id,
|
persistent_filesystem=persistent, task_id=task_id,
|
||||||
volumes=volumes,
|
volumes=volumes,
|
||||||
|
forward_env=docker_forward_env,
|
||||||
)
|
)
|
||||||
|
|
||||||
elif env_type == "singularity":
|
elif env_type == "singularity":
|
||||||
|
|||||||
@@ -76,6 +76,7 @@ For native Anthropic auth, Hermes prefers Claude Code's own credential files whe
|
|||||||
|----------|-------------|
|
|----------|-------------|
|
||||||
| `TERMINAL_ENV` | Backend: `local`, `docker`, `ssh`, `singularity`, `modal`, `daytona` |
|
| `TERMINAL_ENV` | Backend: `local`, `docker`, `ssh`, `singularity`, `modal`, `daytona` |
|
||||||
| `TERMINAL_DOCKER_IMAGE` | Docker image (default: `python:3.11`) |
|
| `TERMINAL_DOCKER_IMAGE` | Docker image (default: `python:3.11`) |
|
||||||
|
| `TERMINAL_DOCKER_FORWARD_ENV` | JSON array of env var names to explicitly forward into Docker terminal sessions |
|
||||||
| `TERMINAL_DOCKER_VOLUMES` | Additional Docker volume mounts (comma-separated `host:container` pairs) |
|
| `TERMINAL_DOCKER_VOLUMES` | Additional Docker volume mounts (comma-separated `host:container` pairs) |
|
||||||
| `TERMINAL_SINGULARITY_IMAGE` | Singularity image or `.sif` path |
|
| `TERMINAL_SINGULARITY_IMAGE` | Singularity image or `.sif` path |
|
||||||
| `TERMINAL_MODAL_IMAGE` | Modal container image |
|
| `TERMINAL_MODAL_IMAGE` | Modal container image |
|
||||||
|
|||||||
@@ -453,6 +453,8 @@ terminal:
|
|||||||
|
|
||||||
# Docker-specific settings
|
# Docker-specific settings
|
||||||
docker_image: "nikolaik/python-nodejs:python3.11-nodejs20"
|
docker_image: "nikolaik/python-nodejs:python3.11-nodejs20"
|
||||||
|
docker_forward_env: # Optional explicit allowlist for env passthrough
|
||||||
|
- "GITHUB_TOKEN"
|
||||||
docker_volumes: # Share host directories with the container
|
docker_volumes: # Share host directories with the container
|
||||||
- "/home/user/projects:/workspace/projects"
|
- "/home/user/projects:/workspace/projects"
|
||||||
- "/home/user/data:/data:ro" # :ro for read-only
|
- "/home/user/data:/data:ro" # :ro for read-only
|
||||||
@@ -517,6 +519,24 @@ This is useful for:
|
|||||||
|
|
||||||
Can also be set via environment variable: `TERMINAL_DOCKER_VOLUMES='["/host:/container"]'` (JSON array).
|
Can also be set via environment variable: `TERMINAL_DOCKER_VOLUMES='["/host:/container"]'` (JSON array).
|
||||||
|
|
||||||
|
### Docker Credential Forwarding
|
||||||
|
|
||||||
|
By default, Docker terminal sessions do not inherit arbitrary host credentials. If you need a specific token inside the container, add it to `terminal.docker_forward_env`.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
terminal:
|
||||||
|
backend: docker
|
||||||
|
docker_forward_env:
|
||||||
|
- "GITHUB_TOKEN"
|
||||||
|
- "NPM_TOKEN"
|
||||||
|
```
|
||||||
|
|
||||||
|
Hermes resolves each listed variable from your current shell first, then falls back to `~/.hermes/.env` if it was saved with `hermes config set`.
|
||||||
|
|
||||||
|
:::warning
|
||||||
|
Anything listed in `docker_forward_env` becomes visible to commands run inside the container. Only forward credentials you are comfortable exposing to the terminal session.
|
||||||
|
:::
|
||||||
|
|
||||||
See [Code Execution](features/code-execution.md) and the [Terminal section of the README](features/tools.md) for details on each backend.
|
See [Code Execution](features/code-execution.md) and the [Terminal section of the README](features/tools.md) for details on each backend.
|
||||||
|
|
||||||
## Memory Configuration
|
## Memory Configuration
|
||||||
|
|||||||
@@ -135,6 +135,8 @@ All container backends run with security hardening:
|
|||||||
- Full namespace isolation
|
- Full namespace isolation
|
||||||
- Persistent workspace via volumes, not writable root layer
|
- Persistent workspace via volumes, not writable root layer
|
||||||
|
|
||||||
|
Docker can optionally receive an explicit env allowlist via `terminal.docker_forward_env`, but forwarded variables are visible to commands inside the container and should be treated as exposed to that session.
|
||||||
|
|
||||||
## Background Process Management
|
## Background Process Management
|
||||||
|
|
||||||
Start background processes and manage them:
|
Start background processes and manage them:
|
||||||
|
|||||||
@@ -212,6 +212,7 @@ Container resources are configurable in `~/.hermes/config.yaml`:
|
|||||||
terminal:
|
terminal:
|
||||||
backend: docker
|
backend: docker
|
||||||
docker_image: "nikolaik/python-nodejs:python3.11-nodejs20"
|
docker_image: "nikolaik/python-nodejs:python3.11-nodejs20"
|
||||||
|
docker_forward_env: [] # Explicit allowlist only; empty keeps secrets out of the container
|
||||||
container_cpu: 1 # CPU cores
|
container_cpu: 1 # CPU cores
|
||||||
container_memory: 5120 # MB (default 5GB)
|
container_memory: 5120 # MB (default 5GB)
|
||||||
container_disk: 51200 # MB (default 50GB, requires overlay2 on XFS)
|
container_disk: 51200 # MB (default 50GB, requires overlay2 on XFS)
|
||||||
@@ -227,6 +228,10 @@ terminal:
|
|||||||
For production gateway deployments, use `docker`, `modal`, or `daytona` backend to isolate agent commands from your host system. This eliminates the need for dangerous command approval entirely.
|
For production gateway deployments, use `docker`, `modal`, or `daytona` backend to isolate agent commands from your host system. This eliminates the need for dangerous command approval entirely.
|
||||||
:::
|
:::
|
||||||
|
|
||||||
|
:::warning
|
||||||
|
If you add names to `terminal.docker_forward_env`, those variables are intentionally injected into the container for terminal commands. This is useful for task-specific credentials like `GITHUB_TOKEN`, but it also means code running in the container can read and exfiltrate them.
|
||||||
|
:::
|
||||||
|
|
||||||
## Terminal Backend Security Comparison
|
## Terminal Backend Security Comparison
|
||||||
|
|
||||||
| Backend | Isolation | Dangerous Cmd Check | Best For |
|
| Backend | Isolation | Dangerous Cmd Check | Best For |
|
||||||
|
|||||||
Reference in New Issue
Block a user