About Gateways and Sandboxes
Every OpenShell deployment starts with a gateway and one or more sandboxes. The gateway is the control plane that manages sandbox lifecycle, providers, and policies. A sandbox is the data plane, a safe, private execution environment where an AI agent runs. Each sandbox runs with multiple layers of protection that prevent unauthorized data access, credential exposure, and network exfiltration. Protection layers include filesystem restrictions (Landlock), system call filtering (seccomp), network namespace isolation, and a privacy-enforcing HTTP CONNECT proxy.
Gateway Types
A gateway provisions sandboxes, brokers CLI requests, enforces policies, and manages provider credentials. OpenShell supports three deployment models, so the gateway can run wherever your workload requires.
All three types expose the same API surface. Sandboxes, policies, and providers work identically regardless of where the gateway runs. The only difference is how the CLI reaches the gateway, whether through a direct Docker socket, SSH tunnel, or HTTPS through a proxy.
You do not need to deploy a gateway manually. Running openshell sandbox create without a gateway auto-bootstraps a local one for you.
Sandbox Lifecycle
Every sandbox moves through a defined set of phases:
Sandbox Policies
OpenShell ships a built-in policy that covers common agent workflows out of the box.
When you create a sandbox without --policy, the default policy is applied. It controls three areas.
For the full breakdown of each default policy block and agent compatibility details, refer to Default Policy.
For the full policy structure with annotated YAML examples, refer to Policies.
Next Steps
Continue with one of the following:
- To create your first sandbox, refer to Manage Sandboxes.
- To supply API keys or tokens, refer to Manage Providers.
- To control what the agent can access, refer to Policies.
- To use a pre-built environment, refer to the Community Sandboxes catalog.