<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>bubblewrap</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/3375/feed"/>
    <updated>2026-04-20T09:03:19+00:00</updated>
    <id>https://links.biapy.com/guest/tags/3375/feed</id>
            <entry>
            <id>https://links.biapy.com/links/11616</id>
            <title type="text"><![CDATA[Fence]]></title>
            <link rel="alternate" href="https://github.com/Use-Tusk/fence" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11616"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Lightweight, container-free sandbox for running commands with network and filesystem restrictions.

Fence wraps commands in a sandbox that blocks network access by default and restricts filesystem operations based on configurable rules. It&amp;#039;s most useful for running semi-trusted code (package installs, build scripts, CI jobs, unfamiliar repos) with controlled side effects, and it can also complement AI coding agents as defense-in-depth.]]>
            </summary>
            <updated>2026-01-26T12:59:06+00:00</updated>
        </entry>
    </feed>
