Seatbelt Sandboxer

🌐Community
by trailofbits · vlatest · Repository

This skill safely executes arbitrary code within a restricted "sandbox," preventing malicious actions while testing or experimenting.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add seatbelt-sandboxer npx -- -y @trustedskills/seatbelt-sandboxer
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "seatbelt-sandboxer": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/seatbelt-sandboxer"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

The Seatbelt Sandboxer skill generates macOS Seatbelt sandbox profiles to isolate applications and restrict their access to system resources. It creates minimal, allowlist-based configurations that default to denying all access, requiring explicit permissions for file read/write, network connections, process execution, and other operations. This allows for safe experimentation or testing of potentially untrusted code while preventing malicious actions.

When to use it

  • A user requests sandboxing, isolation, or restriction of an application on macOS.
  • Sandboxing any macOS process that requires limited file or network access.
  • Implementing defense-in-depth security measures against potential supply chain attacks.

Key capabilities

  • Generates minimal allowlist-based Seatbelt sandbox profiles.
  • Supports parameter substitution (HOME, WORKING_DIR) and path filters for flexible configuration.
  • Handles multi-command applications by creating separate profiles per subcommand.
  • Provides network isolation options: block all, localhost-only, or unrestricted.
  • Includes a step-by-step profiling methodology to identify requirements and iteratively build the sandbox profile.

Example prompts

  • "Can you create a Seatbelt sandbox profile for this Python script?"
  • "I want to restrict network access for this application; generate a sandbox profile with localhost-only networking."
  • “Sandbox this command line tool, allowing it to read only files in the /tmp directory.”

Tips & gotchas

  • This skill is specifically designed for macOS and will not work on Linux or Windows.
  • Sandboxing introduces overhead; avoid using it for quick one-off scripts where performance is critical.
  • Start with a minimal profile and iteratively add permissions based on the application's requirements, following the provided profiling methodology.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
trailofbits
Installs
64

🌐 Community

Passed automated security scans.