diff --git a/.planning/phases/02-safety-sandboxing/02-CONTEXT.md b/.planning/phases/02-safety-sandboxing/02-CONTEXT.md new file mode 100644 index 0000000..576ec4e --- /dev/null +++ b/.planning/phases/02-safety-sandboxing/02-CONTEXT.md @@ -0,0 +1,66 @@ +# Phase 02: Safety & Sandboxing - Context + +**Gathered:** 2026-01-27 +**Status:** Ready for planning + + +## Phase Boundary + +Implement sandbox execution environment for generated code, multi-level security assessment, audit logging with tamper detection, and resource-limited container execution. + + + + +## Implementation Decisions + +### Security Assessment Levels +- **BLOCKED triggers:** Code analysis detects malicious patterns AND known threats; behavioral patterns limited to external code (not Mai herself) +- **HIGH triggers:** Privileged access attempts (admin/root access, system file modifications, privilege escalation) +- **BLOCKED response:** Request user override with explanation before proceeding +- **Claude's Discretion:** Specific pattern matching algorithms and threshold tuning + +### Audit Logging Scope +- **Logging level:** Comprehensive logging of all code execution, file access, network calls, and system modifications +- **Log content:** Timestamps, code diffs, security events, resource usage, and violation reasons +- **Claude's Discretion:** Log retention period, storage format, and alerting mechanisms + +### Sandbox Technology +- **Implementation:** Docker containers for isolation with configurable resource limits and easy cleanup +- **Network policy:** Read-only internet access (can fetch dependencies/documentation but cannot send arbitrary requests) +- **Claude's Discretion:** Container configuration, security policies, and isolation mechanisms + +### Resource Limits +- **Policy:** Configurable quotas based on task complexity and trust level +- **Dynamic allocation:** Allow 2 CPU cores, 1GB RAM, 2 minute execution time for trusted code +- **Resource monitoring:** Real-time tracking and automatic termination on limit violations +- **Claude's Discretion:** Specific quota amounts, monitoring frequency, and response to violations + +### Claude's Discretion +- Audit log retention: Choose appropriate retention policy balancing security and storage +- Sandbox security policies: Choose appropriate container hardening measures +- Network whitelist: Determine which domains are safe for dependency access +- Performance optimization: Balance security overhead with execution efficiency + + + + +## Specific Ideas + +- Audit logs should be tamper-proof and include cryptographic signatures +- Docker containers should use read-only filesystems where possible +- Security assessment should be fast to avoid blocking user workflow +- Resource limits should adapt to available system resources + + + + +## Deferred Ideas + +None — discussion stayed within Phase 2 scope of safety and sandboxing. + + + +--- + +*Phase: 02-safety-sandboxing* +*Context gathered: 2026-01-27* \ No newline at end of file