Image
TheSANDBOX_RUNTIME_CONTAINER_IMAGE
from nikolaik is a pre-built runtime image
that contains our Runtime server, as well as some basic utilities for Python and NodeJS.
You can also build your own runtime image.
Connecting to Your filesystem
A useful feature is the ability to connect to your local filesystem. To mount your filesystem into the runtime:Using SANDBOX_VOLUMES
The simplest way to mount your local filesystem is to use theSANDBOX_VOLUMES
environment variable:
SANDBOX_VOLUMES
format is host_path:container_path[:mode]
where:
host_path
: The path on your host machine that you want to mount.container_path
: The path inside the container where the host path will be mounted.- Use
/workspace
for files you want the agent to modify. The agent works in/workspace
by default. - Use a different path (e.g.,
/data
) for read-only reference materials or large datasets.
- Use
mode
: Optional mount mode, eitherrw
(read-write, default) orro
(read-only).
,
):
Using WORKSPACE_* variables (Deprecated)
Note: This method is deprecated and will be removed in a future version. Please use SANDBOX_VOLUMES
instead.
-
Set
WORKSPACE_BASE
: -
Add the following options to the
docker run
command:
-e SANDBOX_USER_ID=$(id -u)
is passed to the Docker command to ensure the sandbox user matches the host user’s
permissions. This prevents the agent from creating root-owned files in the mounted workspace.
Hardened Docker Installation
When deploying OpenHands in environments where security is a priority, you should consider implementing a hardened Docker configuration. This section provides recommendations for securing your OpenHands Docker deployment beyond the default configuration.Security Considerations
The default Docker configuration in the README is designed for ease of use on a local development machine. If you’re running on a public network (e.g. airport WiFi), you should implement additional security measures.Network Binding Security
By default, OpenHands binds to all network interfaces (0.0.0.0
), which can expose your instance to all networks the
host is connected to. For a more secure setup:
-
Restrict Network Binding: Use the
runtime_binding_address
configuration to restrict which network interfaces OpenHands listens on:This configuration ensures OpenHands only listens on the loopback interface (127.0.0.1
), making it accessible only from the local machine. -
Secure Port Binding: Modify the
-p
flag to bind only to localhost instead of all interfaces:This ensures that the OpenHands web interface is only accessible from the local machine, not from other machines on the network.
Network Isolation
Use Docker’s network features to isolate OpenHands:Docker Desktop Required: Network isolation features, including custom networks and
host.docker.internal
routing, require Docker Desktop. Docker Engine alone does not support these features on localhost across custom networks. If you’re using Docker Engine without Docker Desktop, network isolation may not work as expected.Sidecar Containers
If you want to run sidecar containers to the sandbox ‘runner’ containers without exposing the sandbox containers to the host network, you can use theSANDBOX_ADDITIONAL_NETWORKS
environment variable to specify additional Docker network names that should be added to the sandbox containers.
openhandsredis:6379
.
Docker Compose gotcha
Note that Docker Compose adds a prefix (a scope) by default to created networks, which is not taken into account by the additional networks config. Therefore when using docker compose you have to either:- specify a network name via the
name
field to remove the scoping (https://docs.docker.com/reference/compose-file/networks/#name) - or provide the scope within the given config (e.g.
SANDBOX_ADDITIONAL_NETWORKS: '["myscope_openhands-sccache"]'
wheremyscope
is the docker-compose assigned prefix).