sandbox-configurator
Secure sandbox policy design (filesystem, network, secrets, observability) with auditable guardrails for development runtimes.
$ 安裝
git clone https://github.com/DNYoussef/context-cascade /tmp/context-cascade && cp -r /tmp/context-cascade/skills/security/sandbox-configurator ~/.claude/skills/context-cascade// tip: Run this command in your terminal to install the skill
name: sandbox-configurator description: Secure sandbox policy design (filesystem, network, secrets, observability) with auditable guardrails for development runtimes. allowed-tools: Read, Write, Edit, Bash, Glob, Grep, Task, TodoWrite model: sonnet x-version: 3.2.0 x-category: security x-vcl-compliance: v3.1.1 x-cognitive-frames:
- HON
- MOR
- COM
- CLS
- EVD
- ASP
- SPC
Purpose
Configure sandbox environments with least-privilege controls across filesystem, network, processes, and secrets. Built on skill-forge structure-first delivery and prompt-architect constraint/confidence practices.
Use When / Redirect When
- Use when: defining sandbox policies, tightening egress, mounting read-only assets, and setting observability for development tasks.
- Redirect when: broader network design (
network-security-setup) or general security triage (security).
Guardrails
- Authorized scopes only; deny-by-default for network and filesystem writes.
- No plaintext secrets; use ephemeral tokens or secret stores.
- Capture audit logs for policy changes; include rollback steps.
- Confidence ceilings: inference/report ≤0.70, research 0.85, observation/definition 0.95.
Prompt Architecture Overlay
- HARD/SOFT/INFERRED constraints (runtime, language, network needs, mounts, secrets, observability).
- Two-pass refinement (structure → epistemic) to ensure coverage and evidence.
- English-only outputs with explicit confidence line.
SOP (Sandbox Hardening Loop)
- Scope & Inventory
- Identify runtime (node/python/etc.), required tools, artifacts, and allowed destinations.
- Decide filesystem mounts (read-only vs. writable) and secrets injection method.
- Policy Design
- Network: deny-by-default with allowlist; integrate with
network-security-setupif needed. - Filesystem: read-only code, isolated writable temp, blocked sensitive paths.
- Process: limit capabilities, resource quotas, and disallow dangerous syscalls where possible.
- Observability: enable logging/metrics for policy hits/misses.
- Network: deny-by-default with allowlist; integrate with
- Implementation
- Apply configs/scripts; record changes and approvals.
- Inject secrets via environment/secret store with rotation notes.
- Validation
- Test allowed workflows succeed; confirm blocked actions fail.
- Run regression for dependency installs and common developer actions.
- Delivery
- Provide policy bundle, runbook, and rollback steps.
- Archive artifacts at
skills/security/sandbox-configurator/{project}/{timestamp}with MCP tags (WHO=sandbox-configurator-{session},WHY=skill-execution).
Deliverables
- Sandbox policy pack (network, filesystem, process, secrets) and change log.
- Validation log (allowed vs. blocked tests) with evidence.
- Runbook (operations, monitoring, rollback) and secret handling notes.
Quality Gates
- Structure-first documentation; missing resources/examples/tests noted.
- Deny-by-default enforced; secrets handled securely.
- Evidence attached to claims with confidence ceilings.
- Rollback path verified and documented.
Anti-Patterns
- Granting blanket write access or unrestricted network.
- Hardcoding secrets or disabling logging.
- Skipping rollback testing.
Output Format
- Scope + constraints table (HARD/SOFT/INFERRED).
- Policy summary with validation results and evidence.
- Runbook pointers and residual risks.
- Confidence line:
Confidence: X.XX (ceiling: TYPE Y.YY) - reason.
Confidence: 0.72 (ceiling: inference 0.70) - Sandbox SOP rewritten with skill-forge structure and prompt-architect constraint handling.
Repository
