When to enable sandbox mode
Enable sandbox mode when testing a server from an unknown repository, a server with destructive tools, or a server that requests broad filesystem access.
Sandbox mode is a guardrail, not a proof of safety. Review linter findings, inspect the manifest, and run sample calls against disposable data first.
macOS uses sandbox-exec profiles for declared paths.
Linux uses bubblewrap when available.
Remote SSE/HTTP servers cannot be sandboxed locally; restrict headers and use disposable keys.
Sandbox rejection errors include the denied path or capability when the platform exposes it.
agentstudio connect --stdio "python server.py" --sandbox --allow-read ./fixtures --allow-write ./tmp agentstudio risk-scan ./server --fail-on high