deck-sandbox 0.1.1

seccomp + landlock sandbox host for untrusted MCP servers (ono-sendai)
Documentation

deck-sandbox — the ICE.

Wraps a child process (an MCP server) with a seccomp BPF filter and a landlock filesystem ruleset. On non-Linux targets, this crate degrades to a no-op stub so the workspace still builds, but [enforces] reports false and --sandbox-strict will refuse to launch untrusted servers.

This is the one feature that distinguishes ono-sendai from every other LLM TUI on GitHub: you can run an untrusted MCP server and trust that, at worst, it can only touch the paths you whitelisted.