Central authority for Claude Code sandboxing and isolation. Covers sandboxed bash tool, /sandbox command, filesystem isolation (blocked access, custom paths), network isolation (domain restrictions, proxy support), OS-level enforcement (bubblewrap on Linux, Seatbelt on macOS), sandbox configuration options, escape hatches (dangerouslyDisableSandbox, allowUnsandboxedCommands), and sandbox security limitations. Assists with configuring sandbox settings, understanding isolation mechanisms, and troubleshooting sandbox issues. Delegates 100% to docs-management skill for official documentation.
Limited to specific tools
Additional assets for this skill
This skill is limited to using the following tools:
STOP - Before providing ANY response about Claude Code sandboxing:
- INVOKE
docs-managementskill- QUERY for the user's specific topic
- BASE all responses EXCLUSIVELY on official documentation loaded
Skipping this step results in outdated or incorrect information.
Before responding, verify:
If ANY checkbox is unchecked, STOP and invoke docs-management first.
Central authority for Claude Code sandboxing and isolation. This skill uses 100% delegation to docs-management - it contains NO duplicated official documentation.
Architecture: Pure delegation with keyword registry. All official documentation is accessed via docs-management skill queries.
Keywords: sandboxing, sandbox, /sandbox, filesystem isolation, network isolation, bubblewrap, Seatbelt, dangerouslyDisableSandbox, allowUnsandboxedCommands, excludedCommands, httpProxyPort, socksProxyPort, domain restrictions, sandbox configuration, blocked access
Use this skill when:
Use these keywords when querying docs-management skill for official documentation:
| Topic | Keywords |
|---|---|
| Overview | "sandboxing", "sandboxed bash tool", "/sandbox command" |
| Why Sandbox | "why sandboxing", "approval fatigue", "sandbox productivity" |
| OS Enforcement | "bubblewrap", "Seatbelt", "OS-level enforcement" |
| Topic | Keywords |
|---|---|
| Default Behavior | "filesystem isolation", "sandbox filesystem", "default writes" |
| Blocked Access | "blocked access", "sandbox blocked patterns" |
| Custom Paths | "custom allowed paths", "custom denied paths" |
| Protection | "critical file modification", "filesystem protection" |
| Topic | Keywords |
|---|---|
| Domain Restrictions | "network isolation", "domain restrictions", "sandbox network" |
| Proxy Support | "httpProxyPort", "socksProxyPort", "custom proxy" |
| User Confirmation | "user confirmation domains", "new domain approval" |
| Topic | Keywords |
|---|---|
| Settings | "sandbox configuration", "sandbox settings" |
| Escape Hatch | "dangerouslyDisableSandbox", "allowUnsandboxedCommands" |
| Excluded Commands | "excludedCommands", "sandbox exclusions" |
| Security Limitations | "sandbox security limitations", "domain fronting" |
What do you want to do?
| Issue | Keywords for docs-management |
|---|---|
| Sandbox blocking commands | "excludedCommands", "allowUnsandboxedCommands" |
| Network requests blocked | "network isolation", "domain restrictions" |
| Filesystem access denied | "filesystem isolation", "blocked access" |
| Proxy not working | "httpProxyPort", "socksProxyPort" |
Date: 2025-11-30 Model: claude-opus-4-5-20251101