Skip to main content

VCON Sandbox

VCON containers run inside a security sandbox that restricts access to the host system.


What Gets Sandboxed?

ResourceAccess
File systemRestricted to project directory
NetworkBlocked by default
Process spawningBlocked
System callsFiltered through security layer
MemoryBounded (configurable limit)

How It Works

On Windows, the VCON VM uses Job Objects to enforce resource limits. On Linux/macOS, seccomp/sandbox profiles are used.


Token Restrictions

Certain language features are restricted in sandboxed mode:

  • unsafe blocks are rejected
  • extern calls are rejected
  • modulecpp requires explicit whitelist

Configuration

Sandbox settings can be configured in morph.toml:

[vcon.sandbox]
allow_network = false
allow_filesystem = "project_only"
max_memory_mb = 512

Next Steps

  • Inspect — Examining container contents