Skip to content

Proposal: Standardized Safety Sandbox for Agent Tool Execution #7230

@Protocol-zero-0

Description

@Protocol-zero-0

As multi-agent frameworks evolve, tool execution becomes a critical security vector.

Problem:
Currently, many agents execute code or tools with broad permissions. While sandboxing exists (Docker, etc.), there isn't a standardized, portable way to define safety constraints per tool or per agent that is framework-agnostic.

Proposal:
Introduce a ToolSafetyPolicy interface that can be implemented by different executors (Docker, Firecracker, WASM).

  • Allow defining allow_network, allow_filesystem, max_memory, etc. at the tool definition level.
  • Ensure these policies are enforced by the executor before the tool runs.

This would align Autogen with emerging safety standards in AI.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions