SecBear/nix-sandbox-mcp

Sandboxed code execution for LLMs, powered by Nix

32
/ 100
Emerging

This project helps developers give Large Language Models (LLMs) the ability to run code safely and reliably. It provides sandboxed environments (like Python, Node.js, or shell) where the LLM can execute code, take project files as input, and produce output without affecting the host system. It's used by developers building LLM applications who need robust, isolated code execution capabilities.

Use this if you need to let an LLM run code in a secure, isolated, and reproducible environment, especially when using self-hosted LLM clients.

Not ideal if you need to run LLM code execution on macOS or Windows, or if you require full VM-level isolation for highly untrusted code without Linux.

LLM-tooling developer-productivity application-security AI-engineering code-execution
No Package No Dependents
Maintenance 10 / 25
Adoption 5 / 25
Maturity 11 / 25
Community 6 / 25

How are scores calculated?

Stars

12

Forks

1

Language

Rust

License

MIT

Last pushed

Feb 09, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/llm-tools/SecBear/nix-sandbox-mcp"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.