Skip to main content

Boxer

Sandboxed container execution powered by gVisor

Strong Isolation

Every execution runs inside gVisor's user-space kernel, which intercepts all syscalls before they reach the host. Even a fully compromised container cannot escape to the host OS.

Simple HTTP API

Send a POST request with an image, command, and optional files. Get back stdout, stderr, exit code, and wall time. No daemon to manage, no sidecar containers.

Any Container Image

Pull any OCI image — Python, Node.js, Rust, Go, Perl — and run commands inside it. Images are cached locally and shared read-only across executions for fast startup.

Quick Start

curl -s http://localhost:8080/run \
-H 'Content-Type: application/json' \
-d '{
"image": "python:3.12-slim",
"cmd": ["python3", "-c", "print(42)"]
}'