Developer7 min read@codewitholgun

Yolobox Configurator: Generate AI Sandbox Configs in Seconds

Tags:AI SandboxDockerDeveloper ToolsClaude CodeDevOps

What Is Yolobox and Why Should You Use It?

Yolobox is an open-source CLI that runs AI coding agents (Claude Code, OpenAI Codex, Gemini, Copilot) inside isolated Docker containers. The AI gets full sudo access, auto-approval mode, and complete freedom to install packages and write files, while your home directory stays completely inaccessible. Generate your configuration visually with the free Yolobox Configurator instead of memorizing dozens of CLI flags.

AI coding agents work best when they can run without permission prompts. But giving an AI unrestricted access to your entire machine means one bad command like rm -rf ~ could wipe your home directory. Yolobox solves this by mounting your project at its real path inside a container while keeping everything else sealed off. The tagline says it all: "Let your AI go full send. Your home directory stays home."

The Problem: AI Agents Need Freedom, You Need Safety

Modern AI coding agents like Claude Code, OpenAI Codex, and Google Gemini work dramatically better in "yolo mode," where they can execute commands without asking for permission on every step. But that freedom comes with real risk.

  • Accidental destruction -- an AI that misunderstands context can delete files, overwrite configs, or corrupt your environment
  • Dependency sprawl -- agents install packages globally, polluting your system Python, Node, or Go installations
  • Credential exposure -- unrestricted agents can read ~/.ssh, ~/.aws, ~/.config, API keys, and tokens
  • System modification -- agents with sudo can modify system files, install services, and change network settings
  • No rollback -- damage to your host filesystem is immediate and often irreversible

Running AI agents on bare metal is the 2026 equivalent of running npm install without sandboxing. Yolobox gives agents a full Linux environment with sudo access, while your actual machine stays untouched.

How to Configure Yolobox With the Visual Configurator

Step 1: Open the Configurator

Open the FindUtils Yolobox Configurator in your browser. No signup, no download, no installation needed. Everything runs client-side in your browser.

Step 2: Select Your AI Agent

Choose from the supported agents at the top of the configurator:

AgentYolo ModeCommand
Claude Code--dangerously-skip-permissionsyolobox claude
OpenAI CodexFull access modeyolobox codex
Google Gemini--yoloyolobox gemini
GitHub Copilot--yoloyolobox copilot
OpenCodeNo yolo flagyolobox opencode
ShellInteractive bashyolobox
CustomAny commandyolobox run <cmd>

Each agent runs in the container with its appropriate "full send" flags pre-configured. Select "Custom" to run any command you want inside the sandbox.

Step 3: Configure Host Forwarding

Enable the credentials and sockets your AI agent needs:

  • Git Config -- copies ~/.gitconfig so the agent can commit with your identity
  • GitHub Token -- forwards GH_TOKEN so the agent can create PRs, read issues, and push code
  • SSH Agent -- forwards your SSH agent socket for git operations over SSH
  • Docker Socket -- mounts the Docker socket if your agent needs to build or run containers
  • Claude/Gemini Config -- copies agent-specific configuration directories into the container

Only enable what you actually need. Every forwarded credential is a potential attack surface if the agent runs malicious code.

Step 4: Set Security and Isolation Options

The configurator provides four security toggles:

  • Mindful Mode (no-yolo) -- disables auto-approval, requiring manual confirmation for every command. Useful when testing untrusted codebases
  • Read-Only Project -- mounts your project as read-only. The agent writes to /output instead. Good for code review and analysis tasks
  • Disable Network -- cuts all network access inside the container. Use this for fully offline builds or when processing sensitive code
  • Scratch Session -- creates a fresh home directory and cache for every session. Nothing persists between runs

Step 5: Set Resource Limits

Constrain what the container can consume:

  • CPUs -- limit to specific core count (e.g., "4" or "3.5")
  • Memory -- hard memory limit (e.g., "8g" for 8 gigabytes)
  • Shared Memory -- /dev/shm size, important for Chrome/Puppeteer workloads
  • GPUs -- pass through GPU devices (e.g., "all" or "device=0")

Setting resource limits prevents a runaway AI from consuming your entire machine's resources during compilation or testing.

Step 6: Add Packages and Mounts

The Advanced Configuration section lets you:

  • APT Packages -- add system packages the agent needs (python3-pip, postgresql-client, ffmpeg, etc.). Click suggestions or type custom package names
  • Extra Mounts -- mount additional host directories into the container (format: /host/path:/container/path:rw)
  • Environment Variables -- pass custom env vars (format: KEY=value)
  • Exclude Patterns -- hide files from the container using glob patterns (e.g., *.secret, .env*)
  • Linux Capabilities -- add specific capabilities like SYS_PTRACE for debugging or NET_ADMIN for network tools

Step 7: Copy Your Output

The right panel shows three output tabs:

  1. CLI Command -- a ready-to-paste yolobox command with all your flags
  2. .yolobox.toml -- project-level config file to commit to your repo
  3. Global Config -- ~/.config/yolobox/config.toml for machine-wide settings

Click "Copy" on any tab and paste directly into your terminal or file.

Understanding the Two Config Files

Yolobox uses two configuration files that work together:

FileLocationScopeUse For
.yolobox.tomlProject rootPer-projectPackages, mounts, env vars, network, Dockerfile fragments
config.toml~/.config/yolobox/Machine-wideGit config, tokens, SSH, Docker, resource limits, capabilities

Project config overrides global config. Both are optional -- CLI flags override everything.

When to Use .yolobox.toml vs CLI Flags

Commit .yolobox.toml to your repo when:

  • Team members need the same container setup
  • The project requires specific system packages (e.g., ffmpeg for media processing)
  • You need custom mounts or environment variables
  • The project has a Dockerfile fragment for additional setup

Use CLI flags when:

  • Trying a one-off configuration
  • Overriding project settings temporarily
  • Running a quick sandbox session

Security Model: What Yolobox Protects (and What It Doesn't)

Yolobox provides container-level isolation. This is not a VM -- it is a process namespace boundary with filesystem restrictions.

What it protects against:

  • Accidental rm -rf ~ or similar destructive commands
  • Agent installing packages or services on your host
  • Agent reading your SSH keys, AWS credentials, or browser cookies
  • Agent modifying system configuration files
  • Dependency sprawl from agent-installed global packages

What it does NOT protect against:

  • A determined adversary with kernel exploits could potentially escape the container
  • If you forward your Docker socket, the agent has host-level Docker access
  • If you forward SSH agent or GH token, the agent can use those credentials
  • Container networking is shared with the host by default (unless --no-network is set)

For maximum security, the yolobox project recommends rootless Podman (select "podman" as runtime in the configurator) or VM-level isolation for processing truly untrusted code.

Yolobox Configurator: Free vs Manual Configuration

FeatureFindUtils Configurator (Free)Manual CLI FlagsManual TOML
PriceFree, no signupFreeFree
Learning curveVisual, self-documentingMemorize 30+ flagsLearn TOML syntax
Error-proneImpossible to typo a flagEasy to mistypeTOML syntax errors
All 3 outputsCLI + project TOML + global TOMLOne at a timeOne file
Package suggestionsClick to add common packagesGoogle the apt nameGoogle the apt name
Capability referenceBuilt-in suggestion listMan pagesMan pages
ShareableCopy and paste any outputN/AN/A

The FindUtils Yolobox Configurator generates all three configuration formats simultaneously so you never have to cross-reference documentation.

Real-World Use Cases

1. Full-Stack Feature Development

Give Claude Code complete freedom to scaffold features, install dependencies, run tests, and commit code -- all inside the sandbox.

Configuration: Git config ON, GitHub token ON, SSH agent ON. No resource limits. Network enabled.

2. Untrusted Codebase Review

An AI agent reviews a third-party codebase you cloned. Read-only project mount prevents any modifications. Network disabled prevents data exfiltration.

Configuration: Read-only project ON, no network ON, mindful mode ON. No credentials forwarded.

3. ML/AI Training Workflows

Pass through GPUs for the agent to run training jobs. Add python3-pip and CUDA packages.

Configuration: GPUs = "all", packages = ["python3-pip", "python3-venv"], memory = "16g", cpus = "8".

4. Team Standardization

Commit .yolobox.toml to the repo so every developer gets the same sandbox environment. Include required system packages, custom mounts for shared data, and project-specific env vars.

Common Mistakes When Configuring Yolobox

Mistake 1: Forwarding Everything

Enabling every toggle (git, SSH, Docker, GH token) when the agent only needs to read code. Only forward credentials the agent actually needs for the task.

Mistake 2: Forgetting --no-network for Sensitive Code

If you are reviewing proprietary or sensitive code, always disable network access. An AI agent with network access could theoretically exfiltrate code to its API endpoint.

Mistake 3: Using Docker Runtime Without Rootless Mode

Default Docker runs containers as root on the host kernel. For better isolation, select "podman" runtime in the configurator and install rootless Podman.

Mistake 4: Not Setting Resource Limits

An AI agent running make -j$(nproc) inside a container with no CPU limit will consume every core on your machine. Always set reasonable CPU and memory limits.

Mistake 5: Ignoring the Scratch Flag for Throwaway Tasks

If you are doing a one-off code review or experiment, use the Scratch Session toggle. This prevents the container from accumulating state across sessions.

Tools Used in This Guide

FAQ

Q1: Is the Yolobox Configurator free to use? A: Yes. The FindUtils Yolobox Configurator is completely free with no signup, no usage limits, and no ads. All configuration generation happens in your browser -- nothing is uploaded to any server.

Q2: What is yolobox? A: Yolobox is an open-source CLI tool by Finbarr Taylor that runs AI coding agents (Claude Code, OpenAI Codex, Gemini, Copilot) inside isolated Docker containers. The AI gets full sudo access while your home directory stays completely inaccessible.

Q3: Which AI agents does yolobox support? A: Yolobox supports Claude Code (with --dangerously-skip-permissions), OpenAI Codex, Google Gemini CLI, GitHub Copilot, and OpenCode. You can also run any custom command inside the container using yolobox run <command>.

Q4: Is yolobox safe for running AI agents? A: Yolobox provides container-level isolation that protects against accidental filesystem damage. Your home directory is unmounted by default. For maximum security, use rootless Podman as the container runtime or VM-level isolation for processing untrusted code.

Q5: Where do I put the .yolobox.toml file? A: Place .yolobox.toml in your project root directory. It configures project-specific settings like extra packages, mounts, environment variables, and network isolation. Global settings go in ~/.config/yolobox/config.toml. The FindUtils configurator generates both files.

Q6: Do I need Docker installed to use yolobox? A: Yes. Yolobox requires a container runtime. Docker is the default, but it also supports Podman (recommended for better security) and Apple's container runtime. The configurator lets you select your preferred runtime.

Q7: Can I commit .yolobox.toml to my repository? A: Yes, and you should. Committing .yolobox.toml ensures every developer on your team gets the same sandboxed AI environment with the same packages, mounts, and security settings.

Next Steps