Sandbox types
Small (default)
Container-based. Fast startup, scalable, no infrastructure to manage.- Workloads run as non-root
- Docker daemon is not exposed inside the sandbox
- Each task gets its own isolated network namespace
- Standard container hardening best practices
Large (Full VM)
Dedicated Linux VM per task. No two tasks share the same VM.- 4 vCPU / 8 GB RAM (adjustable)
- 100 GB disk
- Full nested virtualization (Docker-in-Docker)
- Stronger isolation boundary
Pre-installed tools
Both sandbox types come with:| Category | Tools |
|---|---|
| JavaScript | Node.js 22, Bun, pnpm, Yarn |
| Python | Python 3.12, pipx, uv, ruff |
| Ruby | Ruby 3.3, Bundler, RuboCop |
| .NET | .NET SDK 9 |
| Cloud | Google Cloud SDK |
| Containers | Docker 28, Docker Compose 2.31 (Large VM only) |
| Other | Git, curl, ShellCheck, httpie |
Go, Rust, Java, and Elixir are available through Nix dev shells or Dev Containers. Use a
flake.nix or .devcontainer/devcontainer.json to install language-specific tooling for your project.Nix support
If your repo has aflake.nix with devShells.x86_64-linux.default, Tembo automatically detects it and runs commands inside your Nix dev shell.
Dev Containers
Tembo can run tasks inside a Dev Container (.devcontainer/devcontainer.json). Requires the Large VM sandbox. Same format as VS Code Dev Containers and GitHub Codespaces.