You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> **Need a full sandboxed operating system? We've got that too.** <br/>
161
+
>
162
+
> The [Sandbox Agent SDK](https://sandboxagent.dev/) lets you run coding agents in sandboxes and control them over HTTP. Supports Claude Code, Codex, OpenCode, Amp, and Pi. Works with E2B, Daytona, Vercel, Docker, and Cloudflare.
156
163
157
164
## FAQ
158
165
@@ -189,22 +196,22 @@ Yes. Secure Exec supports dynamic module installation via npm inside the executi
189
196
<details>
190
197
<summary>Can I use it to run dev servers like Express, Hono, or Next.js?</summary>
191
198
192
-
Yes. Secure Exec bridges Node.js APIs including http, net, and child_process, so frameworks like Express, Hono, and Next.js work out of the box.
199
+
Yes. Secure Exec bridges Node.js APIs including http, net, and child_process, so frameworks like Express, Hono, and Next.js work out of the box. For production deployments, pair Secure Exec with [Rivet Actors](https://rivet.dev/docs/actors) to get built-in routing, scaling, and lifecycle management for each server instance.
193
200
</details>
194
201
195
202
<details>
196
203
<summary>Can it be used for long-running tasks?</summary>
197
204
198
-
Yes. For orchestrating stateful, long-running processes efficiently, we recommend pairing Secure Exec with [Rivet Actors](https://rivet.dev/docs/actors).
205
+
Yes. For orchestrating stateful, long-running tasks, we recommend pairing Secure Exec with [Rivet Actors](https://rivet.dev/docs/actors). Rivet Actors provide durable state, automatic persistence, and fault-tolerant orchestration — so each long-running task survives restarts and can be monitored, paused, or resumed without you building that infrastructure yourself.
199
206
</details>
200
207
201
208
<details>
202
209
<summary>What are common use cases?</summary>
203
210
204
-
- AI agent code evaluation and tool use
205
-
- User-facing dev servers (Express, Hono, Next.js)
211
+
-[AI agent code evaluation and tool use](https://secureexec.dev/docs/use-cases/ai-agent-code-eval)
212
+
-[User-facing dev servers (Express, Hono, Next.js)](https://secureexec.dev/docs/use-cases/dev-servers)
@@ -220,6 +227,12 @@ Yes. Most Node.js core modules work — including fs, child_process, http, dns,
220
227
Yes. Secure Exec includes a virtual kernel with a system bridge that supports a granular permission model. Filesystem, network, child processes, and environment variables are all available — gated behind deny-by-default permissions.
221
228
</details>
222
229
230
+
<details>
231
+
<summary>Does Secure Exec support JIT compilation?</summary>
232
+
233
+
Yes. Secure Exec runs on native V8 isolates, so your code is JIT-compiled by V8's TurboFan optimizing compiler — the same pipeline that powers Chrome and Node.js. This means full optimization tiers, inline caching, and speculative optimization out of the box.
234
+
</details>
235
+
223
236
<details>
224
237
<summary>How does Secure Exec compare to WASM-based JavaScript runtimes like QuickJS?</summary>
<sub>Package: `@secure-exec/node` (also re-exported from `secure-exec`)</sub>
131
+
<sub>Re-exported from `secure-exec`</sub>
168
132
169
-
Creates a factory for Node.js V8 isolate runtime drivers.
133
+
Creates the execution environment factory for Node.js V8 isolates. Pass the result as the `runtimeDriverFactory` option when constructing a `NodeRuntime`.
<sub>Package: `@secure-exec/browser` (also re-exported from `secure-exec`)</sub>
143
+
<sub>Re-exported from `secure-exec`</sub>
180
144
181
-
Creates a factory for browser Worker-based runtime drivers.
145
+
Creates the execution environment factory for browser Worker-based sandboxes. Pass the result as the `runtimeDriverFactory` option when constructing a `NodeRuntime`.
182
146
183
147
```ts
184
148
createBrowserRuntimeDriverFactory(options?: {
185
149
workerUrl?: URL|string;
186
150
}): NodeRuntimeDriverFactory
187
151
```
188
152
189
-
### `createPyodideRuntimeDriverFactory()`
190
-
191
-
<sub>Package: `@secure-exec/python` (also re-exported from `secure-exec`)</sub>
192
-
193
-
Creates a factory for Pyodide-based Python runtime drivers.
@@ -29,12 +29,13 @@ User code runs inside the sandbox and can only reach host capabilities through t
29
29
30
30
### Runtime
31
31
32
-
The public API. `NodeRuntime`and `PythonRuntime` are thin facades that accept a system driver and a runtime driver factory, then delegate all execution to the runtime driver.
32
+
The public API. `NodeRuntime`is a thin facade that accepts a system driver, then delegates all execution to the isolate.
@@ -59,10 +60,6 @@ Each capability is wrapped in a permission layer before the bridge can call it.
59
60
60
61
The narrow interface between the sandbox and the host. All privileged operations pass through the bridge. It serializes requests, enforces payload size limits, and routes calls to the appropriate system driver capability.
61
62
62
-
### Runtime Driver
63
-
64
-
Manages the actual execution environment. This is where the runtime-specific isolation mechanism lives.
65
-
66
63
## Node Runtime
67
64
68
65
On Node, the sandbox is a V8 isolate managed by `isolated-vm`.
@@ -71,7 +68,6 @@ On Node, the sandbox is a V8 isolate managed by `isolated-vm`.
71
68
flowchart TB
72
69
subgraph Host["Host (Node.js process)"]
73
70
NR["NodeRuntime"]
74
-
NED["NodeExecutionDriver"]
75
71
SD["System Driver"]
76
72
MAFS["ModuleAccessFileSystem"]
77
73
end
@@ -80,8 +76,7 @@ flowchart TB
80
76
BR["Bridge (ivm.Reference callbacks)"]
81
77
MOD["Module Cache"]
82
78
end
83
-
NR --> NED
84
-
NED --> ISO
79
+
NR --> ISO
85
80
UC --> BR
86
81
BR -->|"fs / net / process / crypto"| SD
87
82
SD --> MAFS
@@ -95,7 +90,7 @@ flowchart TB
95
90
-`SharedArrayBuffer` is unavailable in freeze mode
96
91
97
92
**Outside the isolate (host):**
98
-
-`NodeExecutionDriver` creates contexts, compiles modules, and manages the isolate lifecycle
93
+
-The V8 isolate execution environment creates contexts, compiles modules, and manages the isolate lifecycle
0 commit comments