//! Shell sandbox module — kernel-enforced execution isolation for LLM-generated commands.
//!
//! Uses the argv[0] re-exec pattern: when spawning a sandboxed command, the binary
//! re-executes itself with argv[0]="localgpt-sandbox", triggering sandbox setup in
//! a clean, single-threaded child process before exec'ing bash.
//!
//! Platform enforcement:
//! - Linux: Landlock LSM (filesystem) + seccomp-bpf (network syscall deny)
//! - macOS: Seatbelt SBPL profiles via sandbox-exec
pub use sandbox_child_main;
pub use ;
pub use run_sandboxed;
pub use ;