Run lightweight microVMs locally on your machine with programmable networking, custom filesystems, and secrets that never leave the host.
Every sandbox runs as a real microVM on your machine. Networking, filesystems, and secrets are programmable from the host. The guest never knows.
The guest never sees real credentials. microsandbox injects random placeholders and substitutes real values at the network layer, only for verified TLS connections to allowed hosts.
Inspect DNS queries, analyze HTTP traffic, drop packets at the IP level, or build custom data loss prevention. The guest sees a normal network stack.
Mount custom filesystem implementations into any sandbox. Intercept reads and writes, build virtual filesystems, or proxy to remote storage, all through a single trait.
Save full VM state (memory, CPU registers, filesystem) and fork hundreds of identical sandboxes from one baseline. Sub-millisecond restore, no re-boot.
Extend sandbox behavior with in-process Rust plugins or out-of-process plugins in any language. Hook into lifecycle, exec, filesystem, or network events.
Code running inside a sandbox can spawn peer sandboxes alongside itself. Perfect for multi-agent systems where each agent gets its own isolated environment. Fails safely if not running inside a microsandbox.
Sync sandbox filesystems to the cloud. Pick up exactly where you left off from any machine. Same files, same environment.
Define your entire environment in a Sandboxfile. Per-sandbox secrets, network policies, dependency ordering, and scripts. Think Compose, but for microVMs.
msb project up -d.
No round-trips to a remote API. Real VM isolation, programmable from the host, at container speed.
libkrun microVMs, not QEMU. Pre-patched kernel as a shared library. Zero-copy mmap.
Blocks private IPs in DNS responses. Per-connection IP pinning. Cloud metadata blocked.
Auto-generated certs, per-domain bypass. Inspect HTTPS without guest awareness.
Pull from Docker Hub, GHCR, ECR, GCR, or any OCI-compatible registry. Your existing images work.
Embeds the runtime directly. No root process, no socket, no background service.
Native on macOS, Windows, and Linux. Same CLI, same SDKs, same Sandboxfile everywhere.
Local-first sandboxes are coming. Join the waitlist to get early access.
Want to talk first? Schedule a call