New Functionality Comes to Edera’s Open Source Sandboxing Tool Styrolite
Today we're releasing Styrojail, a simple containerization tool that brings a core layer of Edera's hardened runtime security to your local development environment. Now available in Styrolite, Edera’s open source sandboxing technology, Styrojail makes it easy to run untrusted software – like web browsers, AI agents, or third-party tools – with strong isolation guarantees.
Why Styrojail?
As AI-powered development tools and autonomous agents become commonplace, the attack surface for developer machines continues to expand. Running untrusted code – whether it's a browser rendering unknown web content, an AI agent executing scripts, or a third-party CLI tool – introduces risk that traditional infrastructure foundations struggle to contain.
Styrojail addresses this by providing a streamlined containerization experience similar to bubblewrap, but with tighter integration into the Edera ecosystem. When you run an application with Styrojail on your development machine, you're using the same Styrolite sandboxing layer that secures workloads in production on Edera's hardened runtime.
How it works
By default, Styrojail gives your sandboxed application a read-only view of your host system with a single read-write exception: your current workspace. This means untrusted code can read system libraries and configuration, but can't modify anything outside its designated workspace.
To demonstrate, we can run Styrojail from a workspace:
~ % mkdir ~/example-workspace
~ % chdir ~/example-workspace
~/example-workspace % styrojail sh
~/example-workspace $ id
uid=1000(kaniini) gid=1000(kaniini) groups=1000(kaniini),65534(nobody)
~/example-workspace $ cd ..
~ $ echo foo > bar
sh: can't create bar: Read-only file system
~ $ cd example-workspace
~/example-workspace $ echo foo > bar
~/example-workspace $ cat bar
foo
The sandboxed shell can write to the workspace directory, but attempting to write elsewhere on the filesystem fails. This containment happens transparently – no complex configuration required.
For more advanced use cases, Styrojail supports running containers with entirely different root filesystems, enabling lightweight containerization without the overhead of full container runtimes:
% wget -Oalpine.tar.gz https://dl-cdn.alpinelinux.org/alpine/v3.23/releases/x86_64/alpine-minirootfs-3.23.3-x86_64.tar.gz
% tar -C /home/kaniini/alpineroot -zxf alpine.tar.gz
% styrojail --no-default-mounts --rootfs /home/kaniini/alpineroot sh
/ $ cat /etc/alpine-release
3.23.2
/ $ uptime
21:00:47 up 0 min, 0 users, load average: 1.36, 1.37, 1.38
Using Styrojail in development helps validate that your application will work within Edera's security constraints before deploying to production. It's a bridge between local development and Edera’s production-grade hardened runtime platform.
Use cases for AI and untrusted code
Styrojail is particularly relevant as the industry grapples with securing AI-generated and AI-executed code:
- AI agents: Autonomous agents that execute code based on LLM outputs need strict sandboxing to prevent unintended or malicious actions.
- Web browsers: Modern browsers execute vast amounts of untrusted JavaScript and render content from unknown sources. Styrojail provides an additional containment layer.
- Third-party developer tools: CLI tools and scripts from package registries often request broad permissions. Styrojail limits what they can access even if compromised.
- Testing and experimentation: Developers can safely experiment with unfamiliar code or potential malware samples without risking their host system.
Traditional security approaches focus on detecting and responding to threats after they've begun execution. Styrojail embodies Edera's philosophy of shifting left – preventing exploitation through fault isolation rather than racing to detect it.
When a vulnerability exists in sandboxed code, Styrojail's containment ensures the impact remains limited to the designated workspace.
Getting started
Styrojail is available now as part of the Styrolite project. Installation and usage instructions can be found at https://github.com/edera-dev/styrolite.
We welcome feature requests and bug reports through our issue tracker. As Styrojail evolves, we're particularly interested in use cases around AI agent sandboxing and developer workflow integration.
For teams interested in deploying the full Edera hardened runtime in production, visit edera.dev or reach out to discuss your container security needs.

-3.png)