Multi-Provider Runtime
Teams can standardize on Claude, Codex, or both. Developers can choose the agent that fits the task while keeping the same governance, profiles, and audit surface.
Most readers do not need to browse the whole docs tree.
If you just want to get productive quickly, follow this path:
If you are evaluating SCC rather than using it day to day, start with What is SCC?, then read Security Model and Architecture Overview.
These pages answer the questions that usually bring new readers to SCC in the first place.
Multi-Provider Runtime
Teams can standardize on Claude, Codex, or both. Developers can choose the agent that fits the task while keeping the same governance, profiles, and audit surface.
Container Isolation
Code runs in OCI container sandboxes. The agent only sees the mounted workspace instead of your full host filesystem.
Network Egress Control
Containers alone do not stop an agent from reaching the network. SCC can leave egress open, force HTTP/HTTPS through a proxy sidecar, or disable network access entirely.
Standardized Configs
Organization-managed profiles distributed via a single URL. No manual setup for developers.
Built-in Safety Engine
Fail-closed wrappers block destructive git commands and intercept network tools inside every container, even if an agent-native plugin is missing or disabled.
If the main concern is what an agent can reach on your network, start with Security Model or Why Sandbox AI Coding Agents. Containers help, but they are not the whole boundary.
Install SCC CLI
uv tool install scc-clipipx install scc-clipip install scc-cliVerify your environment
scc doctorConfigure and launch
scc setup # Paste your org config URL, connect providersscc start # Launch in current directorySCC setup can connect Claude, Codex, or both. If your organization allows both, developers can keep a default or ask each time and choose the right provider per task.
| Setting | Org Admin | Team Lead | Developer |
|---|---|---|---|
| Block dangerous plugins | ✅ Sets | ❌ Cannot override | ❌ Cannot override |
| Default plugins for all teams | ✅ Sets | — | — |
| Team-specific plugins | ✅ Approves | ✅ Chooses | — |
| Project-local config (.scc.yaml) | ✅ Can restrict | ✅ Can restrict | ✅ Extends |
| Safety-net policy | ✅ Sets | ❌ Cannot override | ❌ Cannot override |
| Provider choice | ✅ Sets allowed list | — | ✅ Chooses from allowed |