Gap
The current WordPress plugin runner shells out to the local CLI and accepts low-level inputs. That is fine for prototype/operator use, but not enough for frontend or hosted-product use.
Goal
Harden sandbox execution so chat/frontend users can request coding tasks without gaining host shell, arbitrary path, or parent-site mutation access.
Acceptance direction
- Restrict executable path to configured allow-list.
- Restrict component paths and artifact paths to configured allow-lists.
- Add task timeouts, process cleanup, concurrency limits, and quotas.
- Remove/lock down arbitrary
code input from frontend-facing task APIs.
- Add audit logging for sandbox run requests and results.
- Add structured denial errors for path, command, quota, timeout, and permission failures.
- Ensure artifacts do not contain secrets.
Notes
This is prerequisite work before exposing sandbox runs to untrusted frontend users.
Gap
The current WordPress plugin runner shells out to the local CLI and accepts low-level inputs. That is fine for prototype/operator use, but not enough for frontend or hosted-product use.
Goal
Harden sandbox execution so chat/frontend users can request coding tasks without gaining host shell, arbitrary path, or parent-site mutation access.
Acceptance direction
codeinput from frontend-facing task APIs.Notes
This is prerequisite work before exposing sandbox runs to untrusted frontend users.