Security
Running AI-generated code in production without proper isolation is like giving an unknown contractor the keys to your entire office building. As coding agents, LLM-powered assistants, and autonomous AI systems become standard development tools, the code they generate needs execution environments that prevent malicious or buggy outputs from compromising your infrastructure. AI sandbox platforms provide isolated execution environments designed to contain untrusted code, limiting its ability to access host systems, sensitive data, or other workloads, even when that code behaves unexpectedly.

When AI systems generate code, you're executing instructions written by a model that learned from vast datasets including potentially malicious examples. Unlike human-written code that goes through review processes, AI-generated code often executes immediately, creating a direct path from model output to system access. The threat vectors are concrete:
These risks are not theoretical. In early 2026, PromptArmor disclosed a vulnerability in Snowflake's Cortex Code CLI (coordinated public disclosure March 16, 2026; fix shipped in version 1.0.25 on February 28, 2026). The incident demonstrated how indirect prompt injection combined with weak command validation allowed AI-generated instructions to bypass human-in-the-loop approval and escape the CLI's sandbox mode, enabling arbitrary code execution and unauthorized access to cached credentials. Separately, CVE-2024-21626, the "Leaky Vessels" runc vulnerability, showed how a file descriptor leak in the container runtime could enable container escape and host filesystem access. Together, these incidents illustrate that both AI agent frameworks and underlying container runtimes present exploitable attack surfaces. Without proper sandboxing, every AI code execution becomes a potential security incident.
An AI sandbox is an isolated execution environment specifically designed to run code generated by AI systems without risking production infrastructure. Unlike traditional sandboxes built for testing, AI sandboxes must handle unpredictable outputs from language models that might generate anything from harmless scripts to sophisticated exploitation attempts. These environments operate on a simple principle: assume all AI-generated code is potentially hostile, and constrain its capabilities accordingly.
Different isolation technologies offer varying security-performance tradeoffs:
Standard Containers (Docker): Share the host kernel, providing namespace isolation but leaving kernel vulnerabilities exposed. As NIST SP 800-190 notes, containers involve OS-level virtualization where multiple applications share a host kernel. Container escapes remain possible through kernel or runtime vulnerabilities, as demonstrated by CVE-2024-21626.
gVisor: A user-space "application kernel" that intercepts system calls before they reach the host kernel. gVisor's Sentry component handles all workload syscalls and never passes any system call directly to the host; the Sentry itself is restricted to a small allowlist of roughly 68 host syscalls, significantly reducing the kernel attack surface. Overhead is highly workload-dependent: CPU-bound tasks may see modest impact, while syscall-heavy, filesystem-intensive, or network-heavy workloads can experience more substantial slowdowns, as documented in peer-reviewed benchmarking. Modal uses gVisor for its sandbox isolation.
Firecracker microVMs: Full hardware virtualization in lightweight packages, offering strong isolation with higher resource consumption than containers.
Kata Containers: Combines container orchestration with VM isolation, offering a middle ground between standard containers and full VMs by running each container inside a lightweight virtual machine while preserving the container API.
Production AI sandboxes require specific capabilities beyond basic isolation:
Security isolation historically meant performance penalties that made sandboxed execution impractical for production workloads. Modern platforms have largely solved this tradeoff through infrastructure engineering.
Cold start latency determines whether sandboxed execution feels responsive or sluggish. When an AI agent needs to run generated code, waiting several seconds for environment initialization kills user experience. Leading platforms achieve fast cold starts through several techniques:
Memory snapshotting: Pre-warm common execution states and restore them instead of initializing from scratch.
Optimized filesystems: Custom filesystem implementations that prioritize fast reads for common dependencies.
Modal's core platform emphasizes memory snapshotting and a custom filesystem specifically optimized for these fast-startup patterns.
Production AI applications generate thousands of code execution requests simultaneously. Each coding agent interaction, each batch job iteration, and each user request might spawn sandboxed execution. Scaling requirements include:
Rapid provisioning: Create new sandbox instances in milliseconds, not seconds.
Efficient scheduling: Route requests to available capacity without queuing delays.
Resource pooling: Share underlying infrastructure across sandboxes while maintaining isolation.
Automatic scaling: Expand and contract capacity based on demand without manual intervention.
Modal Sandboxes demonstrate these capabilities with support for 50,000+ concurrent sessions, scaling from zero to thousands of containers as demand fluctuates.
Network access represents the highest-risk capability for untrusted code. An AI-generated script with unrestricted network access can exfiltrate data, download additional payloads, or attack external systems. Network isolation should be the default configuration. Sandboxes start with no network access, and you explicitly enable only required connections. Ingress controls determine how external requests reach sandboxed services. For AI sandboxes running web services, configure specific ports and protocols rather than exposing arbitrary network surfaces. Tunneling capabilities enable controlled access when needed. Modal's sandbox networking documentation covers how to configure tunnels and port exposure for interactive processes while maintaining security boundaries. Data flow logging tracks all network activity for audit purposes. Even when connections succeed, logging enables detection of unexpected communication patterns indicating compromise.
You can't secure what you can't see. Comprehensive observability transforms sandbox security from reactive incident response to proactive threat detection.
Real-time logging: Captures stdout, stderr, and system events from every sandbox execution. Stream logs to centralized platforms for correlation and alerting.
Metrics collection: Tracks resource utilization patterns. Sudden spikes in CPU, memory, or network usage might indicate cryptomining, data processing, or attack activity.
Distributed tracing: Follows requests across sandbox boundaries. When AI-generated code calls external services or spawns additional processes, tracing maintains visibility.
Audit logs: Provide compliance evidence and forensic capability. Modal's Enterprise plan includes audit logs, and Modal can export audit logs to an OpenTelemetry provider alongside function logs and container metrics.
Alerting rules: Define thresholds for automatic notification. Configure alerts for failed executions, resource limit violations, and anomalous behavior patterns.
Even with managed sandbox platforms handling infrastructure security, you maintain responsibility for application-level security decisions.
Your responsibilities include: Defining appropriate resource limits for each workload type, configuring network access policies aligned with actual requirements, managing secrets and credentials passed to sandboxed code, reviewing and responding to security alerts, maintaining secure coding practices in wrapper code, and implementing input validation before passing data to sandboxes.
Platform responsibilities typically cover: Infrastructure security and patching, isolation technology maintenance, compliance assurances (SOC 2 Type II audits) and support for HIPAA-compliant usage, network security at the platform level, and physical data center security.
Modal articulates a shared responsibility model covering backup, recovery, and availability, with vulnerability remediation SLAs targeting 24 hours for critical issues and one week for high-severity findings.
Modal built its sandbox capabilities for running untrusted user or agent code, including AI-generated code, making it a strong fit for teams running inference, training, and batch processing workloads that need secure code isolation.
Technical foundation: Modal's Sandboxes are built on gVisor, which provides strong isolation and custom logic to block malicious system calls. gVisor's Sentry never passes workload system calls through to the host, blocking the kernel-level exploits that standard containers leave exposed.
Performance at scale: Modal Sandboxes deliver fast cold starts while supporting 50,000+ concurrent sessions. The platform also provides memory snapshotting, a faster filesystem, and gVisor-based isolation as core capabilities.
Platform integration: Unlike standalone sandbox services, Modal integrates sandboxed execution with its broader AI infrastructure, including inference, training, and batch processing. Run inference, training, sandboxes, batch, and notebooks on the same Modal platform, with native observability and telemetry integrations.
Compliance readiness: Modal maintains SOC 2 Type II certification with no deviations found. Modal supports HIPAA-compliant workloads on Enterprise plans via a BAA for customers handling PHI.
Developer experience: Modal's code-first SDK lets you define sandbox environments in code rather than configuration files, and Modal Sandboxes support all programming languages.
For teams already using Modal for ML workloads, adding sandboxed execution for AI-generated code requires minimal additional infrastructure. For teams evaluating sandbox platforms specifically, Modal offers a compelling combination of security, performance, and platform breadth.
Check the sandboxes documentation to explore implementation patterns.
View Sandboxes DocsAn AI sandbox provides isolated execution that limits untrusted code's ability to access host systems, sensitive data, or other workloads, even when that code behaves maliciously or unexpectedly. Without sandboxing, every AI code execution creates potential for system compromise, data exfiltration, or lateral movement to other infrastructure components. The NVIDIA AI Red Team has documented how unsandboxed AI code execution workflows enable remote code execution via prompt injection, reinforcing that sandboxing is a required security control.
gVisor implements a user-space "application kernel" that intercepts system calls before they reach the host kernel, reducing the kernel attack surface available to untrusted workloads. The gVisor Sentry handles all workload syscalls and restricts its own host interactions to roughly 68 allowlisted syscalls out of over 350 in the Linux kernel. Overhead is workload-dependent: CPU-bound tasks see minimal impact, while syscall- and I/O-heavy workloads can experience more significant slowdowns, as peer-reviewed benchmarking confirms.
Yes, Modal Sandboxes support any untrusted code execution use case, not just AI-generated code. The platform's gVisor isolation, network controls, and resource limits apply equally to code from any source, whether generated by LLMs, submitted by users, or pulled from external repositories.
Modern AI sandbox platforms achieve fast cold starts, and Modal documents memory snapshotting, a faster filesystem, and gVisor-based isolation as core platform capabilities. Modal specifically supports scaling to 50,000+ concurrent sessions while maintaining isolation guarantees, enabling production workloads that would have been impractical with older sandbox technologies.
SOC 2 Type II is a commonly requested assurance report in many enterprise procurement processes, covering controls related to security, availability, and confidentiality as defined by the AICPA trust services categories. Requirements vary by customer and industry. Modal maintains SOC 2 Type II certification with no deviations found. For healthcare and regulated industries, when a covered entity engages a service provider as a business associate involving PHI, HIPAA requires a Business Associate Agreement defining permitted uses, disclosures, and safeguards. Modal supports HIPAA-compliant workloads on Enterprise plans through BAAs for customers handling protected health information.