How We Built Secure, Scalable Agent Sandbox Infrastructure
Summary
The article describes two isolation patterns for sandboxing agents that can execute code, and why Pattern 2 (full agent isolation with a credential-holding control plane) is preferred. It details the sandbox architecture, hardening measures, a stateless control plane, secure file sync via presigned URLs, and scalable deployment using Unikraft micro-VMs and ECS Fargate.