1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
//! deck-sandbox — the ICE.
//!
//! Wraps a child process (an MCP server) with a seccomp BPF filter and a
//! landlock filesystem ruleset. On non-Linux targets, this crate degrades
//! to a no-op stub so the workspace still builds, but [`enforces`] reports
//! `false` and `--sandbox-strict` will refuse to launch untrusted servers.
//!
//! This is the *one* feature that distinguishes ono-sendai from every
//! other LLM TUI on GitHub: you can run an untrusted MCP server and trust
//! that, at worst, it can only touch the paths you whitelisted.
use Sandbox;
pub use SandboxProfile;
pub use LinuxSandbox as PlatformSandbox;
pub use StubSandbox as PlatformSandbox;
/// Short human-readable tag for diagnostics (`doctor` subcommand).
/// `true` if the host kernel actually enforces a policy when we apply one.