top | item 46599773

(no title)

raesene9 | 1 month ago

What specifically are you concerned about when running an LLM agent in a container versus a VM.

Assuming a standard Docker/Podman container with just the project directory mounted inside it, what vectors are you expecting the LLM to use to break out?

discuss

order

catlifeonmars|1 month ago

From “How it works” in the readme:

> yolobox uses container isolation (Docker or Podman) as its security boundary…

I have no issue with running agents in containers FWIW, just in framing it as a security feature.

> what vectors are you expecting the LLM to use to break out?

You can just search for “Docker CVE”.

Here is one later last year, just for an example: https://nvd.nist.gov/vuln/detail/CVE-2025-9074

raesene9|1 month ago

Everything has CVEs, you can find CVEs in VM hypervisors if you like (the one you linked is in Docker Desktop, not Docker engine which is what this project uses).

There are valid criticisms of Docker/Podman isolation but it's not a binary "secure/not secure" thing, and honestly in this use case I don't see a major difference, apart from it being easier for a user to weaken the isolation provided by the container engine.

Docker/Podman security is essentially Linux security, it just uses namespaces+cgroups+capabilities+apparmor/SELinux+seccomp filters. There's a larger attack surface for kernel vulns when compared to VM hypervisors, but I've not heard of an LLM trying to break out by 0-day'ing the Linux kernel as yet :)