Skip to content
Cisco AI Defense logo
CiscoAI Security

defenseclaw sandbox — DefenseClaw

Overview

defenseclaw sandbox — [experimental] Manage openshell-sandbox standalone mode.

Reference

Synopsis

defenseclaw sandbox [OPTIONS]

Subcommands

SubcommandDescription
initInitialize openshell-sandbox standalone mode (Linux only).
setupConfigure DefenseClaw for openshell-sandbox standalone mode.

Description

[experimental] Manage openshell-sandbox standalone mode

[experimental] Manage openshell-sandbox standalone mode.

Linux-only. Creates an isolated sandbox environment with Landlock, seccomp, and network namespaces for running OpenClaw agents.

 Requires 'defenseclaw init' to have been run first.

 Commands: init Create sandbox user, transfer OpenClaw, configure networking setup Customize sandbox networking, policy, and device pairing

defenseclaw sandbox init

Initialize openshell-sandbox standalone mode (Linux only)

Initialize openshell-sandbox standalone mode (Linux only).

Creates the sandbox user, transfers OpenClaw ownership, installs the DefenseClaw plugin into the sandbox, and configures networking.

 Prerequisite: Run 'defenseclaw init' first to set up the base environment.

 Example: defenseclaw sandbox init

defenseclaw sandbox setup

Configure DefenseClaw for openshell-sandbox standalone mode

Configure DefenseClaw for openshell-sandbox standalone mode.

Full orchestration: configures networking, generates systemd units, patches OpenClaw config, sets up device pairing, and installs policy.

 Example: defenseclaw sandbox setup --sandbox-ip 10.200.0.2 --host-ip 10.200.0.1 defenseclaw sandbox setup --policy strict --no-auto-pair defenseclaw sandbox setup --disable

Options

FlagTypeDefaultEnv varRequiredDescription
--sandbox-iptext10.200.0.2noBridge IP of the sandbox (default: 10.200.0.2)
--host-iptext10.200.0.1noBridge IP of the host (default: 10.200.0.1)
--sandbox-hometextnoSandbox user home directory (default: /home/sandbox)
--openclaw-portinteger18789noOpenClaw gateway port inside sandbox
--policychoice (default, strict, permissive)permissivenoNetwork policy template
--dnstext8.8.8.8,1.1.1.1noDNS nameservers (comma-separated, or 'host')
--no-auto-pairbooleannoDisable automatic device pre-pairing
--no-host-networkingbooleannoSkip host-side iptables rules (DNS, UI forwarding, MASQUERADE)
--no-guardrailbooleannoSkip guardrail network setup (API_PORT + GUARDRAIL_PORT iptables)
--disablebooleannoRevert to host mode (no sandbox)
--non-interactivebooleannoSkip confirmation prompts

Usage

Initialize sandbox support

defenseclaw sandbox init

Configure sandbox networking

defenseclaw sandbox setup --sandbox-ip 10.42.0.2 --host-ip 10.42.0.1 --non-interactive

The Go gateway binary owns runtime sandbox service controls such as status, start, stop, and shell.

Related