GSoC 2026 — Idea #8: Native Windows Sandbox using AppContainer #21274
Replies: 3 comments 1 reply
-
|
PoC Update - Build & Tests Passing on Windows 11 Test A: Sandboxed process attempts write to C:\Windows\ → Access Denied (AppContainer blocks it) Screen.Recording.2026-03-06.061906.mp4Up next: IPv6 WFP layer support (FWPM_LAYER_ALE_AUTH_CONNECT_V6) |
Beta Was this translation helpful? Give feedback.
-
|
Hi Anushka, this is honestly a really impressive exploration of the Windows sandboxing space. I’m currently studying the Gemini CLI codebase as well, and seeing a working PoC around AppContainer isolation and WFP-based network filtering was actually inspiring like why didn't i do that. I especially liked how you mapped the existing macOS Seatbelt profiles to AppContainer equivalents ,that kind of parity thinking seems important for keeping sandbox behavior similar across different platforms. One thought that came to mind while reading your integration plan: since Gemini CLI already relies on different sandbox mechanisms across macOS and Linux, do you think it might eventually make sense to introduce a more personal kinda cross-platform sandbox abstraction layer in the CLI? For example, if each OS backend (Seatbelt, bubblewrap, AppContainer) exposes slightly different capabilities around filesystem or network policies, the CLI might eventually need a common interface that normalizes those behaviors. I’m curious whether you’ve thought about how AppContainer capabilities might map into such a model if the sandbox system evolves further in the future. Also really cool to see a PoC already validating things like ACL-restricted filesystem access and blocked writes to protected directories -that’s a great proof that the approach is viable, its like you are already selected. Looking forward to seeing where this goes. It definitely motivated me to dig deeper into the sandbox architecture in the repo. |
Beta Was this translation helpful? Give feedback.
-
|
From my point of view, the proposal looks serious because it is grounded in an actual AppContainer proof of concept instead of only a high level plan. The next thing that would make it even stronger is a clear compatibility story for how capability differences are normalized so users do not get materially different sandbox expectations across platforms. A thin common policy model with backend specific lowering feels like the right direction. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi everyone! 👋
I'm Anushka Pandit, a 4th-year CS student at BITS Pilani, and I'm applying for Idea #8: Native Windows Sandbox using AppContainer for GSoC 2026.
What I've Done So Far
Working Proof of Concept
I've built a fully functional Node-API (C++) addon demonstrating:
CreateAppContainerProfile, capability SIDs, ACL-based filesystem gatingFwpmEngineOpen0/FwpmFilterAdd0🔗 PoC repo: https://github.com/AnushkaPandit-21/appcontainer-node-sandbox
Contributions to gemini-cli
test(core): add missing tests for errorClassificationfix(core): use path.join in grep test assertions for Windows compatibilityfeat(sandbox): add Windows platform detection in sandboxConfig.tsIntegration Plan
I've identified 3 hook points in the existing codebase:
sandboxConfig.ts:getSandboxCommand()— addwin32platform detectionsandbox.ts:start_sandbox()— dispatch to AppContainer launcherpackages/windows-sandbox/— native addon packageQuestions for Mentors
packages/windows-sandbox/or within the existing CLI package?@gsquared94 — Would love your feedback on this approach!
Looking forward to connecting with mentors and other contributors. 🙏
Beta Was this translation helpful? Give feedback.
All reactions