Back to Infrastructure
infrastructureL1 Ad-hocAgent Runtime & Sandboxing

No isolation

"No isolation" describes the default state at L1: the AI agent runs directly in the developer's working environment with no boundary between the agent's execution context and the d

  • ·Agents run inside the developer's local IDE (no separate runtime)
  • ·No isolation between agent execution and developer's local environment
  • ·Developers are aware of the security implications of agents with full local access
  • ·Agent access scope (file system, network) is understood even if not restricted

Evidence

  • ·Agent runs as IDE plugin with no containerization or isolation
  • ·No sandboxing configuration exists

What It Is

"No isolation" describes the default state at L1: the AI agent runs directly in the developer's working environment with no boundary between the agent's execution context and the developer's full system. The agent process has access to the same filesystem, environment variables, network interfaces, and credentials as the developer. There is no container, no sandbox, no permission boundary of any kind between the agent and the rest of the machine.

This is not a deliberate architectural choice. It is the absence of a choice. When a developer installs Cursor or Claude Code and starts using it, no isolation is the default. The agent runs as the developer, sees what the developer sees, and can do what the developer can do. For early exploration, this is fine. As a long-term operating model for autonomous agents, it is a security liability that grows with agent capability.

The risk profile of no isolation is asymmetric. On most days, nothing goes wrong. Agents fix bugs, write tests, and update docs. But the occasional catastrophic event - an agent that deletes the wrong directory, exfiltrates credentials through an unexpected network call, or corrupts configuration files - is entirely possible and has no guardrail. The longer an organization runs agents without isolation, and the more capable those agents become, the more likely a serious incident becomes.

Understanding what "no isolation" means concretely is the first step toward fixing it. The agent can read ~/.aws/credentials, ~/.ssh/id_rsa, any .env file in any project directory, browser cookie stores, and any secret stored in the system keychain if the developer has granted the terminal access to it. The agent can make outbound network requests to any host the developer's machine can reach. It can write to any file the developer can write to. This is the blast radius of an uncontrolled agent.

Why It Matters

  • Credential exposure is the highest-severity risk - SSH keys, cloud provider credentials, database passwords, and API tokens are all readable by default, making credential theft via a compromised or misbehaving agent a real attack vector
  • Debugging agent mistakes is harder without isolation - when an agent modifies files across the entire filesystem rather than a bounded working directory, reconstructing exactly what changed requires exhaustive diff-checking rather than simply inspecting the isolated environment
  • Incident scope is unbounded - an agent mistake in a no-isolation environment can affect not just the current project but any data the developer's account can access, including other repositories, cloud resources, and internal tooling
  • Compliance violations become invisible - agents reading files that contain personal data, payment card information, or protected health information create compliance obligations that no one tracks because no one knows the agent touched those files
  • Trust ceiling is structurally low - developers who understand the blast radius of no-isolation agents will constrain agent autonomy as a self-protective measure, capping the productivity gains that agents could otherwise deliver

Getting Started

6 steps to get from here to the next level

Common Pitfalls

Mistakes teams actually make at this stage - and how to avoid them

How Different Roles See It

B
BobHead of Engineering

Bob has 40 developers using Cursor daily. His security team recently asked him about the AI tooling and he realized he does not have a clear answer for what the agents are doing or what they have access to. He is not aware of any incidents, but he also has no visibility into agent activity. He knows something needs to change but does not know how urgent it is.

What Bob should do - role-specific action plan

S
SarahProductivity Lead

Sarah has been focused on agent adoption rates and productivity metrics. She has not been thinking about isolation because it sounds like a security concern, not a productivity concern. But she is starting to see developers deliberately limit agent autonomy - turning off auto-approve, manually reviewing every command - in ways that cap the productivity gains. When she asks why, developers consistently mention concerns about what the agent might do accidentally.

What Sarah should do - role-specific action plan

V
VictorStaff Engineer - AI Champion

Victor has been running agents extensively and has accumulated a collection of near-miss stories: an agent that almost committed a file with a database connection string, a session where the agent used the AWS CLI in a way that would have been problematic if he had not been watching, a case where the agent read from a directory it should not have known about. Victor mentally manages these risks through vigilance, but he knows that vigilance does not scale to the rest of the team.

What Victor should do - role-specific action plan