Token-based authentication protects the dashboard. Supports both access tokens and GitHub OAuth.
The main dashboard shows sandbox statistics, a creation form, and the active sandboxes table with real-time status. Four profiles: minimal, development, offline, and strict.
Detailed view of the strict sandbox showing the terminal, command policy with git history blocking, network policy cards with blocked database ports, and live audit feed.
Running 'ls -la' inside the strict sandbox. The command gate checks the whitelist and allows execution. Result appears instantly via HTMX.
Attempting 'git log -p' is blocked immediately. Git history content is restricted to prevent PII exposure from commit diffs. A violation is logged to the audit trail.
Network policy cards show blocked database ports (MSSQL, PostgreSQL, MySQL, MongoDB, Redis, etc.). Database access is blocked at both command and network levels.
Every command execution, lifecycle event, and security violation is recorded with HMAC-signed, hash-chained audit entries. Blocked commands are highlighted in red.
Four built-in profiles with different security postures: minimal, development, offline, and strict.
Full configuration view of the strict profile with tabs for filesystem, commands, network, resources, guardrails, audit, and raw JSON.
The commands tab shows the whitelist of allowed commands and blocked argument patterns. Git push, log -p, diff, and show are blocked to prevent PII exposure.
The network tab shows the strict profile's network mode (none) with all database ports blocked as defense in depth.
LASSO verifies container runtimes (Docker/Podman), Linux kernel namespaces, and cgroups v2 for full isolation.