Replies: 1 comment
-
|
Yeah, I was looking at this for few months. Getting to actually prototype several approaches, kata was one of them, custom controller managing pvc access per agent session another. And trying 2 more. I think kagenti should have built-in generic agents like this loaded from example repo. With this, we can do agent similar to claude-code, with file based RAG capabilities and writing creating docs and scripts in sandboxed space. And we should e2e test these agents in kagenti/kagenti CI. Only weather agent has e2e tests now. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Context
Some AI agents need to execute code that they generate at runtime (e.g., coding agents, data analysis agents).
Today, Kagenti provides:
However, agents run as standard Deployments, and any code they execute runs with the agent's full privileges. I'm wondering if there's a need for runtime isolation when agents execute untrusted or LLM-generated code.
A Potential Approach
I came across Agent Sandbox, a Kubernetes SIG Apps project that seems designed for this use case. From their README:
It provides:
SandboxCRD for managing isolated podsSandboxWarmPoolfor pre-warmed sandboxesOn OpenShift, this could potentially use OpenShift Sandboxed Containers as the underlying Kata runtime.
Worth noting: Agent Sandbox is an upstream Kubernetes project—the CRDs and controller are not Red Hat supported. Only OpenShift Sandboxed Containers (Kata) itself is supported.
How It Might Work
If I understand correctly, the pattern would be:
The Sandbox runs as a separate pod with its own identity, providing isolation from the agent.
Questions
References
Beta Was this translation helpful? Give feedback.
All reactions