<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: souvik1997</title><link>https://news.ycombinator.com/user?id=souvik1997</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 08 May 2026 17:52:45 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=souvik1997" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by souvik1997 in "Coding Agent VMs on NixOS with Microvm.nix"]]></title><description><![CDATA[
<p>Edera looks very cool! Awesome team too.<p>I read the thesis on arxiv. Do you see any limitations from using Xen instead of KVM? I think that was the biggest surprise for me as I have very rarely seen teams build on Xen.</p>
]]></description><pubDate>Wed, 04 Feb 2026 19:27:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=46890437</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46890437</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46890437</guid></item><item><title><![CDATA[New comment by souvik1997 in "Coding Agent VMs on NixOS with Microvm.nix"]]></title><description><![CDATA[
<p>Hey @clawsyndicate I'd love to learn more about your use case. We are working on a product that would potentially get you the best of both worlds (microVM security and containers/gVisor scalability). My email is in my profile.</p>
]]></description><pubDate>Wed, 04 Feb 2026 18:27:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46889579</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46889579</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46889579</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>This is a really interesting direction we have been exploring too! Our approach is basically to create a file containing the prompt for each turn within the virtual filesystem. The results seem promising so far</p>
]]></description><pubDate>Fri, 30 Jan 2026 23:48:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46831602</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46831602</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46831602</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Yep, we got that sorted. Thanks for the suggestion! 
<a href="https://pypi.org/project/amla-sandbox/" rel="nofollow">https://pypi.org/project/amla-sandbox/</a></p>
]]></description><pubDate>Fri, 30 Jan 2026 20:20:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=46829338</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46829338</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46829338</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>True. bubblewrap and similar (Landlock, sandbox-exec on Mac) are solid lightweight options. The main difference is they still expose a syscall interface that you then restrict, vs WASM where capabilities are opt-in from zero. Different starting points, similar goals.<p>Some advantages of building the sandbox in wasm, aside from the security benefits, are complete execution reproducibility. amla-sandbox controls all external side effects, leaving the wasm core as just "pure computation", which makes recording traces and replaying them very easy. It's great for debugging complex workflows.</p>
]]></description><pubDate>Fri, 30 Jan 2026 19:22:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46828703</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46828703</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46828703</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>If I had to rank these, in order of least to most secure, it would be container < VM < WASM.<p>WASM has:<p>- Bounds checked linear memory<p>- No system calls except what you explicitly grant via WASI<p>- Much smaller attack surface<p>VMs have:<p>- Hardware isolation, separate kernel<p>- May have hypervisor bugs leading to VM escape (rare in practice though)<p>Some problems with containers:<p>- Shared host kernel (kernel exploit = escape)<p>- Seccomp/AppArmor/namespaces reduce attack surface but don't eliminate it<p>- Larger attack surface (full syscall interface)<p>- Container escapes are a known class of vulnerability</p>
]]></description><pubDate>Fri, 30 Jan 2026 19:20:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46828670</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46828670</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46828670</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>We will take a look! Thanks for sharing. Dynamic linking to run pydantic/numpy/etc. would be huge!</p>
]]></description><pubDate>Fri, 30 Jan 2026 18:41:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46828178</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46828178</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46828178</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>The opus 4.5 confession is great haha. We have found Claude Code + Opus 4.5 + Rust  with miri/cargo-deny/cargo-check/cargo-fmt + Python with strict type checking/pedantic lint rules/comprehensive test suites to be a winning combination. It makes AI-assisted development surprisingly viable for systems work.<p>Good to see that you chose a similar path for networking in eryx!</p>
]]></description><pubDate>Fri, 30 Jan 2026 18:40:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=46828161</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46828161</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46828161</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Makes total sense. We'll prioritize getting the WASM source out. This is good signal that it matters. Will ping you when it's up!</p>
]]></description><pubDate>Fri, 30 Jan 2026 18:28:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46828002</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46828002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46828002</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>The ecosystem layer is a hard but very important problem to solve. Right now we define tools in Python on the host side, but I see a clear path to WIT-defined components. The registry of portable tools is very compelling.<p>Will checkout asterai, thanks for sharing!</p>
]]></description><pubDate>Fri, 30 Jan 2026 18:21:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=46827908</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46827908</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46827908</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Thanks Simon! Denobox looks very cool: Deno's permissions model is a natural fit for this.<p>On the licensing: totally fair point. Our intention is to open source the WASM too. The binary is closed for now only because we need to clean up the source code before releasing it as open-source. The Python SDK and capability layer are MIT.
We wanted to ship something usable now rather than wait. Since the wasm binary runs in wasmtime within an open source harness, it is possible to audit everything going in and out of the wasm blob for security.<p>Genuinely open to feedback on this. If the split license is a blocker for your use cases, that's useful signal for us.</p>
]]></description><pubDate>Fri, 30 Jan 2026 18:10:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=46827776</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46827776</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46827776</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Fair points.<p>On containers: yes, running in Docker/Firecracker works. The "one prompt injection and you’re done" framing is hyperbolic for containerized setups. The pitch is more relevant for people running agents in their local environment without isolation, or who want something lighter than spinning up containers per execution.<p>On the licensing: completely valid concern. We are a new company (just two cofounders right now) and the binary is closed for now only because we need to clean up the source code before releasing it as open-source. The Python SDK and capability layer are MIT.<p>I get that "trust us" isn’t compelling for a security product from an unknown entity, but since the Wasm binary runs within wasmtime (one of the most popular Wasm runtimes) and you can audit everything going in and out of it, the security story should hopefully be more palatable while we work on open sourcing the Wasm core.<p>The 2025/2026 date discrepancy is just me being sloppy with the license</p>
]]></description><pubDate>Fri, 30 Jan 2026 17:21:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=46827107</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46827107</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46827107</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Thanks! That’s exactly the use case we built this for</p>
]]></description><pubDate>Fri, 30 Jan 2026 17:16:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46827051</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46827051</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46827051</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>The sandbox doesn’t run models. it runs agent-generated code and constrains tool calls. The model runs wherever you want (OpenAI, Anthropic, local Ollama, whatever).</p>
]]></description><pubDate>Fri, 30 Jan 2026 17:09:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46826971</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46826971</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46826971</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Interesting! What use cases felt too constrained? We've been mostly focused on "agent calls tools with parameters". Curious where you hit flexibility limits.<p>Would love to see your MCP approach if you've published it anywhere.</p>
]]></description><pubDate>Fri, 30 Jan 2026 16:57:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46826810</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46826810</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46826810</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Thanks for sharing localsandbox! sqlite-backed VFS for fork and resume workflows is very interesting.</p>
]]></description><pubDate>Fri, 30 Jan 2026 16:29:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46826390</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46826390</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46826390</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Great question. We cheated a bit; we didn't compile the GNU coreutils to wasm. Instead, we have Rust reimplementations of common shell commands. It allows us to focus on the use cases agents actually care about instead of reimplementing all of the corner cases exactly.<p>For `jq` specifically we use the excellent `jaq_interpret` crate: <a href="https://crates.io/crates/jaq-interpret" rel="nofollow">https://crates.io/crates/jaq-interpret</a><p>curl is interesting. We don't include it currently but we could do it without too much additional effort.<p>Networking isn't done within the wasm sandbox; we "yield" back to the the caller using what we call "host operations" in order to perform any IO. This keeps the Wasm sandbox minimal and as close to "pure compute" as possible. In fact, the only capabilities we give the WASI runtime is a method to get the current time and to generate random numbers. Since we intercept all external IO, random number generation, time, and the Wasm runtime is just for pure computation, we also get perfect reproducibility. We can replay anything within the sandbox exactly.<p>Your approach with brush is interesting. Having actual bash semantics rather than "bash-like" is a real advantage for complex scripts. The dynamic linking problem for subcommands is a tough one; have you looked at WASI components for this? Feels like that's where it'll eventually land but the tooling isn't there yet.<p>Will check out eryx and conch. Thanks for sharing!</p>
]]></description><pubDate>Fri, 30 Jan 2026 16:18:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=46826223</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46826223</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46826223</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Thanks for sharing the context! The fork problem is gnarly. Makes sense that full Linux emulation was the path forward for your use case.<p>Agreed on WASI maturity. We're hoping the component model lands in a stable form soon. Would love to see the ecosystem converge so these approaches can interoperate.</p>
]]></description><pubDate>Fri, 30 Jan 2026 16:00:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46825980</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46825980</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46825980</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Fair point. We get around this by "yielding" back from the Wasm runtime (in a coroutine style) so that the "host" can do network calls or other IO on behalf of the Wasm runtime. But it would be great to do this natively within Wasm!</p>
]]></description><pubDate>Fri, 30 Jan 2026 15:59:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46825968</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46825968</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46825968</guid></item><item><title><![CDATA[New comment by souvik1997 in "Show HN: Amla Sandbox – WASM bash shell sandbox for AI agents"]]></title><description><![CDATA[
<p>Appreciate your support! We deliberately chose a limited runtime (quickjs + some shell applets). The tool parameter constraint enforcement was more important to us  than language completeness. For agent tool calling, you don't really need NumPy and Pandas.<p>Wasmer is doing great work—we're using wasmtime on the host side currently but have been following your progress. Excited to see WASM sandboxing become more mainstream for this use case.</p>
]]></description><pubDate>Fri, 30 Jan 2026 15:20:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=46825427</link><dc:creator>souvik1997</dc:creator><comments>https://news.ycombinator.com/item?id=46825427</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46825427</guid></item></channel></rss>