Security Risk
AI agents can execute arbitrary commands on your host machine, including destructive ones like rm -rf or git push --force.
SCC (Sandboxed Coding CLI) is a provider-neutral governed runtime for AI coding agents. It runs Claude Code and Codex inside container sandboxes (Docker Engine, OrbStack, Colima, or Docker Desktop) with organization-managed team profiles, a built-in safety engine, and git worktree support.
You do not need to read every page to start using SCC.
When teams use AI coding agents, several challenges emerge:
Security Risk
AI agents can execute arbitrary commands on your host machine, including destructive ones like rm -rf or git push --force.
Configuration Drift
Each developer sets up their environment differently, leading to inconsistent behavior and hard-to-reproduce issues.
Plugin Chaos
Without governance, developers install random plugins that may conflict or introduce security vulnerabilities.
Provider Lock-in
Teams want to evaluate or switch between AI coding agents without rebuilding their governance, config, and plugin infrastructure.
SCC supports multiple AI coding agents through a provider-neutral architecture. Claude Code and Codex are first-class providers today. The architecture is extensible — adding a new provider means adding one adapter, not changing the core.
scc provider show # See current preferencescc provider set codex # Switch default providerscc start --provider claude ~/project # Override for one sessionYour org config, team plugins, safety policies, and governance carry over regardless of which provider you use. Teams can standardize on one provider, allow both, or mix them by workflow. That makes SCC easier to adopt in organizations where one team prefers Claude for exploratory work and another prefers Codex for backend-heavy tasks.
Every agent session runs inside an OCI container. The agent can only access files you explicitly mount, and it cannot affect your host system directly.
Container isolation protects the host filesystem boundary, but it does not automatically solve network risk. A normal container can still reach the internet or internal services that your runtime can route to.
SCC separates those concerns clearly:
open keeps normal outbound network accessweb-egress-enforced routes HTTP/HTTPS through a Squid proxy sidecar on an internal-only networklocked-down-web disables network access entirely with --network=noneThat distinction matters when teams worry about agents reaching internal APIs, metadata endpoints, or services outside the current workspace.
SCC includes a fail-closed safety engine that runs inside every container:
push --force, reset --hard, branch -D, clean -fd, and other destructive git commandsThe optional scc-safety-net plugin provides additional coverage via agent-native hooks (currently Claude Code; Codex support planned).
Organization admins define a single JSON config that specifies:
Developers just run scc setup once and they’re ready.
When network_policy is set to web-egress-enforced, SCC creates an internal-only Docker network. The agent container can only reach the internet through a Squid proxy sidecar that enforces an ACL. This is real network topology enforcement — even if the agent ignores proxy environment variables, it physically cannot bypass the proxy. The compiled ACL also denies loopback, private CIDRs, link-local ranges, and cloud metadata endpoints before any allow rules are applied.
SCC uses git worktrees to create isolated branches for each task:
scc worktree create ~/project feature-auth# Creates isolated branch scc/feature-auth# Auto-starts an agent session in the worktree| Role | What SCC Provides |
|---|---|
| Developers | Instant setup, protected main branch, isolated experiments, provider choice |
| Team Leaders | Approved plugin sets, consistent configs across the team |
| Org Admins | Security policies, blocked plugins, audit trails, provider governance |
Quick Start
Ready to try it? Install and run in 30 seconds →
Core Concepts
Want to understand more? Learn the key concepts →
Security Model
Need the network and isolation details? Review the security layers →
Why Sandbox AI Coding Agents
Evaluating the risk model? See where containers help and where they do not →