Everruns supports multiple sandbox environments for isolated code execution. Choose the sandbox type that fits your deployment and security requirements.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/everruns/everruns/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Sandbox capabilities provide:- Isolated execution - Each sandbox is a separate environment
- File management - Read/write files in sandbox filesystem
- Command execution - Run shell commands with output capture
- Git integration - Clone repositories with automatic authentication
- Multi-sandbox support - Multiple sandboxes per session
Sandbox Types
- Daytona
- CodeSandbox
- Docker
Status: Available (all environments)Capability ID:
daytonaPlatform: Cloud-based sandboxes via DaytonaFeatures:- Full Linux environments with network access
- Synchronous command execution
- Git operations with credential helper
- Auto-stop after 5 minutes of inactivity
- Workspace download to session storage
- Get API key from Daytona Dashboard
- Configure in Settings > Connections > Daytona
- Enable
daytonacapability on your agent
daytona_create_sandbox- Create and start a sandboxdaytona_exec- Run shell commands (sync)daytona_read_file/daytona_write_file- File operationsdaytona_download_workspace- Download to session storagedaytona_list_sandboxes- List session sandboxesdaytona_manage_sandbox- Stop or deletedaytona_git_clone- Clone repositoriesdaytona_git_credentials- Configure git for push/pull
Daytona Configuration
API Key Setup
Get Daytona API key
- Sign up at Daytona
- Navigate to API Keys
- Create a new API key
Configure in Everruns
Option 1: User Connection (recommended)Navigate to Settings > Connections > Daytona and enter your API key.Option 2: Session SecretSet
DAYTONA_API_KEY as a session secret (useful for per-session keys).Git Authentication
Daytona integrates with GitHub for repository access: Clone repositories:- Resolves GitHub token from user connections
- Falls back to
GITHUB_TOKENsession secret - If token found: authenticates automatically (private repos supported)
- If no token: public repos only
daytona_exec authenticate automatically:
GitHub tokens expire in ~1 hour. Call
daytona_git_credentials again to refresh.CodeSandbox Configuration
API Key Setup
CodeSandbox requires a session-scoped API key:Execution Modes
CodeSandbox supports both sync and async execution: Synchronous (wait for completion):Docker Configuration
Session-Scoped Containers
Each session gets its own container:- Name:
everruns-{session_id} - Lifecycle: Lazily started on first tool use
- Isolation: Separate container per session
Container Management
Multi-Sandbox Workflows
Daytona and CodeSandbox support multiple sandboxes per session: Use cases:- Frontend + backend in separate sandboxes
- A/B testing different configurations
- Parallel test execution
- Isolated environment per feature
Workspace Download
Download sandbox files to session storage:- Downloaded from sandbox filesystem
- Stored in session storage (persistent)
- Accessible via
session_file_systemtools
Lifecycle Management
Auto-Stop/Hibernate
Daytona:- Auto-stops after 5 minutes of inactivity
- Use
daytona_manage_sandboxwithaction: "delete"to clean up
- Auto-hibernates after 5 minutes of inactivity
- Use
csb_manage_sandboxwithaction: "delete"to clean up
- Container persists for session duration
- Use
docker_stopto explicitly stop and remove
Best Practices
Security
API Keys
- Daytona: Stored in user connections (encrypted) or session secrets (encrypted)
- CodeSandbox: Stored in session secrets (encrypted)
- Encryption: AES-256-GCM envelope encryption at rest
- Never exposed: API responses show
api_key_setindicator only
Sandbox Isolation
- Per-session state: Sandbox IDs scoped to session
- No cross-session access: Sandboxes cannot be shared between sessions
- Filesystem isolation: Each sandbox has its own filesystem
- Network access: Full network access (use with caution)
Git Credentials
Daytona git credentials:- Short-lived tokens (~1 hour expiry)
- Written to
/tmp/.git-credentialsin sandbox - Lost on sandbox stop
- Same trust boundary as exec access (TM-DAYTONA-001, TM-DAYTONA-002)
Pre-configured Agents
Everruns seeds demo agents:- Daytona Coder - Uses
daytona,session_storage,session_file_system
Comparison
| Feature | Daytona | CodeSandbox | Docker |
|---|---|---|---|
| Platform | Cloud | Cloud | Local |
| Availability | All | All | Dev-only |
| Execution | Sync | Sync + Async | Sync |
| Multi-sandbox | Yes | Yes | No |
| Git integration | Full (clone + credentials) | Clone only | Manual |
| Auto-stop | 5 min | 5 min (hibernate) | Manual |
| API key | User connection or secret | Session secret | N/A |
| Risk level | High | High | High |
Next Steps
- Create agents - Build agents with sandbox capabilities
- Session storage - Store sandbox results
- User connections - Configure Daytona API key