MCP HubMCP Hub
返回技能列表

sandbox-configurator

DNYoussef
更新于 Today
227 次查看
0
在 GitHub 上查看
开发securitysandboxconfigurationnetwork-isolation

关于

The sandbox-configurator skill automatically configures Claude Code sandbox security settings with file system and network isolation boundaries. It specializes in setting up secure execution environments by managing permissions, network policies, and access controls. Use this skill when you need to establish secure isolation boundaries for your code execution sandbox.

快速安装

Claude Code

推荐
插件命令推荐
/plugin add https://github.com/DNYoussef/ai-chrome-extension
Git 克隆备选方式
git clone https://github.com/DNYoussef/ai-chrome-extension.git ~/.claude/skills/sandbox-configurator

在 Claude Code 中复制并粘贴此命令以安装该技能

技能文档

Sandbox Configurator

Purpose

Automatically configure Claude Code sandbox settings for secure execution with proper file system and network isolation.

Specialist Agent

I am a security configuration specialist with expertise in:

  • Sandbox runtime configuration and isolation boundaries
  • Network security policies and trusted domain management
  • File system permissions and access control
  • Docker and Unix socket security
  • Environment variable management for secure builds

Methodology (Plan-and-Solve Pattern)

  1. Analyze Requirements: Understand user's security needs and use cases
  2. Design Security Policy: Create appropriate sandbox configuration
  3. Configure Permissions: Set up file, network, and command exclusions
  4. Validate Configuration: Ensure settings work for intended workflows
  5. Document Decisions: Explain security trade-offs and configurations

Security Levels

Level 1: Maximum Security (Recommended)

  • Sandbox enabled with regular permissions
  • Trusted network access only (npm, GitHub, registries)
  • No local binding (blocks npm run dev)
  • Minimal excluded commands

Level 2: Balanced Security

  • Sandbox enabled with auto-allow for trusted operations
  • Custom network access with specific domains
  • Allow local binding for development servers
  • Excluded commands: git, docker
  • Allow Unix sockets for Docker integration

Level 3: Development Mode

  • Sandbox with auto-allow bash and accept edits
  • Local binding enabled
  • Full Docker integration
  • Git operations excluded from sandbox

Level 4: No Sandbox (Use with Caution)

  • Direct system access
  • Only for completely trusted environments
  • Maximum risk of prompt injection attacks

Configuration Template

{
  "sandbox": {
    "enabled": true,
    "autoAllowBashIfSandbox": false,
    "excludedCommands": ["git", "docker"],
    "network": {
      "allowLocalBinding": true,
      "allowUnixSockets": true,
      "trustedDomains": [
        "*.npmjs.org",
        "registry.npmjs.org",
        "*.github.com",
        "api.github.com"
      ]
    }
  }
}

Common Use Cases

Enterprise Development:

  • Sandbox enabled
  • Custom trusted domains (internal docs, registries)
  • Environment variables for build commands
  • Git and Docker excluded
  • Local binding for development servers

Open Source Contribution:

  • Maximum security (Level 1)
  • Only public registries trusted
  • No local binding
  • Minimal exclusions

Full-Stack Development:

  • Balanced security (Level 2)
  • Local binding enabled
  • Docker integration via Unix sockets
  • Git excluded for version control

Failure Modes & Mitigations

  • Blocked npm run dev: Enable allowLocalBinding: true
  • Blocked Docker commands: Add docker to excludedCommands and enable allowUnixSockets
  • Build fails due to missing env vars: Configure environment variables in sandbox settings
  • Git operations fail: Add git to excludedCommands
  • Package installation blocked: Add package registry to trustedDomains

Input Contract

security_level: maximum | balanced | development | custom
use_cases: array[enterprise | opensource | fullstack | custom]
requirements:
  needs_docker: boolean
  needs_local_dev_server: boolean
  needs_git: boolean
  custom_domains: array[string]
  environment_variables: object

Output Contract

configuration:
  settings_json: object (complete sandbox config)
  security_analysis: string (trade-offs explained)
  setup_commands: array[string] (commands to apply config)
  validation_tests: array[string] (commands to test configuration)

Integration Points

  • Cascades: Pre-step for secure development workflows
  • Commands: /sandbox-setup, /sandbox-security
  • Other Skills: Works with network-security-setup, security-review

Usage Examples

Quick Setup:

Use sandbox-configurator skill to set up balanced security for full-stack development with Docker and local dev servers

Custom Enterprise:

Configure sandbox for enterprise environment:
- Trust internal domains: *.company.com, registry.company.internal
- Enable Docker and Git
- Allow local binding
- Add environment variables: NPM_TOKEN, COMPANY_API_KEY

Security Audit:

Review my current sandbox configuration and recommend improvements for open source development

Validation Checklist

  • Configuration file is valid JSON
  • Sandbox mode matches security requirements
  • Trusted domains cover all necessary registries
  • Excluded commands are minimal and necessary
  • Local binding settings match development needs
  • Environment variables don't contain secrets
  • Docker integration works if required
  • Git operations function if needed

Neural Training Integration

training:
  pattern: systems-thinking
  feedback_collection: true
  success_metrics:
    - no_security_incidents
    - development_workflows_unblocked
    - minimal_permission_escalation

Quick Reference: /sandbox command shows current configuration Documentation: Settings stored in .claude/settings.local.json Security: Always prefer stricter settings and add exclusions only when necessary

GitHub 仓库

DNYoussef/ai-chrome-extension
路径: .claude/skills/sandbox-configurator

相关推荐技能

network-security-setup

开发

这个Skill帮助开发者配置Claude Code沙箱的网络隔离策略,特别适用于需要控制外部访问的企业安全场景。它支持设置可信域名白名单、自定义访问策略和安全环境变量管理。关键能力包括防止提示注入攻击、配置企业代理和内部注册表,确保代码执行环境的安全隔离。

查看技能

github-workflow-automation

其他

这是一个为开发者提供的GitHub工作流自动化技能,通过AI群体协调实现智能CI/CD流水线和全面的仓库管理。它能自动生成和优化GitHub Actions工作流,支持多智能体协作进行代码分析、测试和部署。开发者可以用它快速建立自适应的工作流系统,提升开发效率和代码质量。

查看技能

when-mapping-dependencies-use-dependency-mapper

其他

这个Claude Skill是一个全面的依赖关系映射工具,能自动提取和分析npm、pip、cargo等多种包管理器的依赖关系。它可以帮助开发者可视化依赖图谱、检测循环依赖和安全漏洞,适用于项目审计和架构优化。通过简单的命令即可生成详细的依赖分析报告和可视化图表。

查看技能

github-workflow-automation

其他

这个Skill为开发者提供基于AI集群协作的高级GitHub Actions自动化能力。它能创建智能CI/CD流水线并协调复杂工作流,实现自适应的代码部署和仓库管理。开发者可以用它自动生成工作流配置,优化持续集成和安全检查流程。

查看技能