Spaces:
Running
Running
Z User commited on
Commit ·
06cb3d4
1
Parent(s): f52e0ed
新增:终端沙箱隔离层(灵感来自 OpenAI Agents SDK Sandbox Agent)
Browse files在 Hermes 的 5 阶段终端安全引擎基础上,增加实际的操作系统级隔离:
- 危险命令(删除/格式化/网络外传/进程管理)自动在沙箱中执行
- 沙箱机制:Linux namespace 隔离(PID/Network/Mount)+ 资源限制
- 优先使用 bubblewrap(bwrap),不可用时回退到 unshare + ulimit
- 资源限制:CPU 60s / 内存 512MB / 进程 100 个 / 文件描述符 1000
- 网络隔离:沙箱内无网络访问(防止数据外泄)
- 文件系统:根目录只读挂载,仅 /tmp/hermes-sandbox 可写
- 读写命令不受影响,保持直接执行
匹配规则:
破坏性:rm -rf, shred, dd, mkfs, format, wipefs, chmod 777, chown -R, kill -9 等
网络外传:curl upload, wget, nc, ncat, scp, rsync, python socket/requests 等
新增文件:scripts/patch_sandbox_isolation.py
修改:Dockerfile(安装 bubblewrap + 应用补丁)
修改:start.sh(自动更新后重应用补丁)
- Dockerfile +6 -0
- scripts/patch_sandbox_isolation.py +305 -0
- start.sh +3 -0
Dockerfile
CHANGED
|
@@ -50,6 +50,12 @@ RUN python3 /tmp/patch_weixin_cross_loop.py; rm -f /tmp/patch_weixin_cross_loop.
|
|
| 50 |
COPY scripts/patch_strip_thinking_tags.py /tmp/patch_strip_thinking_tags.py
|
| 51 |
RUN python3 /tmp/patch_strip_thinking_tags.py; rm -f /tmp/patch_strip_thinking_tags.py
|
| 52 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 53 |
# Patch: DuckDuckGo free fallback for web_search (no API key needed)
|
| 54 |
COPY scripts/patch_web_search_fallback.py /tmp/patch_web_search_fallback.py
|
| 55 |
RUN python3 /tmp/patch_web_search_fallback.py; rm -f /tmp/patch_web_search_fallback.py
|
|
|
|
| 50 |
COPY scripts/patch_strip_thinking_tags.py /tmp/patch_strip_thinking_tags.py
|
| 51 |
RUN python3 /tmp/patch_strip_thinking_tags.py; rm -f /tmp/patch_strip_thinking_tags.py
|
| 52 |
|
| 53 |
+
# Patch: Sandbox isolation for dangerous terminal commands (inspired by OpenAI Agents SDK)
|
| 54 |
+
# Installs bubblewrap if available, falls back to unshare + resource limits
|
| 55 |
+
RUN apt-get update && apt-get install -y --no-install-recommends bubblewrap 2>/dev/null || true; rm -rf /var/lib/apt/lists/*
|
| 56 |
+
COPY scripts/patch_sandbox_isolation.py /tmp/patch_sandbox_isolation.py
|
| 57 |
+
RUN python3 /tmp/patch_sandbox_isolation.py; rm -f /tmp/patch_sandbox_isolation.py
|
| 58 |
+
|
| 59 |
# Patch: DuckDuckGo free fallback for web_search (no API key needed)
|
| 60 |
COPY scripts/patch_web_search_fallback.py /tmp/patch_web_search_fallback.py
|
| 61 |
RUN python3 /tmp/patch_web_search_fallback.py; rm -f /tmp/patch_web_search_fallback.py
|
scripts/patch_sandbox_isolation.py
ADDED
|
@@ -0,0 +1,305 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
#!/usr/bin/env python3
|
| 2 |
+
"""Patch hermes-agent to add sandbox isolation for dangerous terminal commands.
|
| 3 |
+
|
| 4 |
+
Inspired by OpenAI Agents SDK's Sandbox Agent concept.
|
| 5 |
+
|
| 6 |
+
ARCHITECTURE:
|
| 7 |
+
Hermes already has a 5-stage terminal safety engine that classifies commands
|
| 8 |
+
by risk level (read / write / destructive / network / process). This patch
|
| 9 |
+
adds ACTUAL isolation for dangerous commands instead of just "confirm first":
|
| 10 |
+
|
| 11 |
+
Risk Level Before Patch After Patch
|
| 12 |
+
───────────────── ────────────────────── ────────────────────────────
|
| 13 |
+
Read-only Direct execution Direct execution (unchanged)
|
| 14 |
+
Write Direct execution Direct execution (unchanged)
|
| 15 |
+
Destructive Confirm → execute SANDBOXED execution (namespace isolation + resource limits)
|
| 16 |
+
Network Confirm → execute SANDBOXED (network namespace isolated)
|
| 17 |
+
Process mgmt Confirm → execute SANDBOXED (PID namespace isolated)
|
| 18 |
+
|
| 19 |
+
SANDBOX MECHANISM (Linux namespace isolation via unshare):
|
| 20 |
+
1. PID namespace — sandboxed process can't see/kill host processes
|
| 21 |
+
2. Network namespace — sandboxed process has NO network access (prevents exfil)
|
| 22 |
+
3. Mount namespace — filesystem is read-only except for /tmp/hermes-sandbox
|
| 23 |
+
4. Resource limits — CPU time cap, memory cap, no fork bombs
|
| 24 |
+
5. /tmp sandbox — writable directory for temporary files only
|
| 25 |
+
|
| 26 |
+
FALLBACK:
|
| 27 |
+
If unshare is unavailable (non-Linux or no CAP_SYS_ADMIN), the sandbox
|
| 28 |
+
gracefully degrades to "confirm + resource limits only" mode.
|
| 29 |
+
|
| 30 |
+
FILES PATCHED:
|
| 31 |
+
- tools/environments/local.py — wraps _run_bash with sandbox for dangerous cmds
|
| 32 |
+
- tools/approval.py (optional) — marks sandboxed commands in approval output
|
| 33 |
+
"""
|
| 34 |
+
|
| 35 |
+
import sys
|
| 36 |
+
import os
|
| 37 |
+
import glob
|
| 38 |
+
import re
|
| 39 |
+
import subprocess
|
| 40 |
+
import textwrap
|
| 41 |
+
|
| 42 |
+
|
| 43 |
+
SANDBOX_WRAPPER_CODE = '''
|
| 44 |
+
# ── Hermes Bot patch: Sandbox isolation for dangerous commands ──
|
| 45 |
+
# Inspired by OpenAI Agents SDK Sandbox Agent concept.
|
| 46 |
+
|
| 47 |
+
import os
|
| 48 |
+
import sys
|
| 49 |
+
import resource
|
| 50 |
+
import subprocess
|
| 51 |
+
import tempfile
|
| 52 |
+
import shutil
|
| 53 |
+
|
| 54 |
+
# Sandbox writable directory
|
| 55 |
+
_SANDBOX_TMP = "/tmp/hermes-sandbox"
|
| 56 |
+
|
| 57 |
+
def _ensure_sandbox_tmp():
|
| 58 |
+
"""Create sandbox temp directory if it doesn't exist."""
|
| 59 |
+
os.makedirs(_SANDBOX_TMP, mode=0o700, exist_ok=True)
|
| 60 |
+
|
| 61 |
+
def _can_use_unshare():
|
| 62 |
+
"""Check if unshare with namespaces is available."""
|
| 63 |
+
if sys.platform != "linux":
|
| 64 |
+
return False
|
| 65 |
+
try:
|
| 66 |
+
# Test if we can create a user namespace (cheapest check)
|
| 67 |
+
proc = subprocess.run(
|
| 68 |
+
["unshare", "--user", "--map-root-user", "true"],
|
| 69 |
+
capture_output=True, timeout=3,
|
| 70 |
+
)
|
| 71 |
+
return proc.returncode == 0
|
| 72 |
+
except (FileNotFoundError, subprocess.TimeoutExpired, OSError):
|
| 73 |
+
return False
|
| 74 |
+
|
| 75 |
+
_CAN_USE_UNSHARE = _can_use_unshare()
|
| 76 |
+
|
| 77 |
+
def _apply_resource_limits():
|
| 78 |
+
"""Set resource limits for sandboxed processes."""
|
| 79 |
+
# Max 60 seconds CPU time (prevents infinite loops)
|
| 80 |
+
resource.setrlimit(resource.RLIMIT_CPU, (60, 60))
|
| 81 |
+
# Max 512MB memory
|
| 82 |
+
resource.setrlimit(resource.RLIMIT_AS, (512 * 1024 * 1024, 512 * 1024 * 1024))
|
| 83 |
+
# Max 100 processes (prevents fork bombs)
|
| 84 |
+
resource.setrlimit(resource.RLIMIT_NPROC, (100, 100))
|
| 85 |
+
# Max 1000 open files
|
| 86 |
+
resource.setrlimit(resource.RLIMIT_NOFILE, (1000, 1000))
|
| 87 |
+
|
| 88 |
+
def _sandbox_command_unshare(cmd_string: str) -> str:
|
| 89 |
+
"""Wrap command in Linux namespace isolation via unshare.
|
| 90 |
+
|
| 91 |
+
Creates: PID namespace + network namespace + mount namespace.
|
| 92 |
+
Filesystem is mostly read-only; /tmp/hermes-sandbox is writable.
|
| 93 |
+
"""
|
| 94 |
+
_ensure_sandbox_tmp()
|
| 95 |
+
# Build the sandbox wrapper script
|
| 96 |
+
sandbox_script = textwrap.dedent(f"""\\
|
| 97 |
+
# Set resource limits
|
| 98 |
+
python3 -c "import resource; resource.setrlimit(resource.RLIMIT_CPU, (60, 60)); resource.setrlimit(resource.RLIMIT_AS, (512*1024*1024, 512*1024*1024)); resource.setrlimit(resource.RLIMIT_NPROC, (100, 100)); resource.setrlimit(resource.RLIMIT_NOFILE, (1000, 1000))" 2>/dev/null
|
| 99 |
+
|
| 100 |
+
# Remount root as read-only
|
| 101 |
+
mount -o remount,ro / 2>/dev/null || true
|
| 102 |
+
|
| 103 |
+
# Create writable tmp
|
| 104 |
+
mkdir -p {_SANDBOX_TMP}
|
| 105 |
+
mount -t tmpfs -o size=256m,nr_inodes=10000 tmpfs {_SANDBOX_TMP} 2>/dev/null || true
|
| 106 |
+
|
| 107 |
+
# Bind-mount /tmp into sandbox (read-write overlay)
|
| 108 |
+
mkdir -p {_SANDBOX_TMP}/tmp
|
| 109 |
+
mount --bind /tmp {_SANDBOX_TMP}/tmp 2>/dev/null || true
|
| 110 |
+
|
| 111 |
+
# Create a minimal /etc for DNS resolution (read-only copy)
|
| 112 |
+
mkdir -p {_SANDBOX_TMP}/etc
|
| 113 |
+
cp /etc/resolv.conf {_SANDBOX_TMP}/etc/resolv.conf 2>/dev/null || true
|
| 114 |
+
|
| 115 |
+
# Execute the actual command with writable tmp
|
| 116 |
+
cd {_SANDBOX_TMP}
|
| 117 |
+
export TMPDIR={_SANDBOX_TMP}
|
| 118 |
+
{cmd_string}
|
| 119 |
+
""")
|
| 120 |
+
# Wrap in unshare with PID + network + mount namespaces
|
| 121 |
+
return f"unshare --pid --net --mount --fork --map-root-user -- bash -c {repr(sandbox_script)}"
|
| 122 |
+
|
| 123 |
+
def _sandbox_command_fallback(cmd_string: str) -> str:
|
| 124 |
+
"""Fallback sandbox: resource limits only (no namespace isolation).
|
| 125 |
+
|
| 126 |
+
Used when unshare is not available.
|
| 127 |
+
"""
|
| 128 |
+
_ensure_sandbox_tmp()
|
| 129 |
+
limiter = textwrap.dedent(f"""\\
|
| 130 |
+
ulimit -t 60 2>/dev/null # 60s CPU time
|
| 131 |
+
ulimit -v 524288 2>/dev/null # 512MB virtual memory
|
| 132 |
+
ulimit -u 100 2>/dev/null # 100 processes
|
| 133 |
+
cd {_SANDBOX_TMP}
|
| 134 |
+
export TMPDIR={_SANDBOX_TMP}
|
| 135 |
+
{cmd_string}
|
| 136 |
+
""")
|
| 137 |
+
return limiter
|
| 138 |
+
|
| 139 |
+
def sandbox_wrap(cmd_string: str) -> str:
|
| 140 |
+
"""Wrap a dangerous command in sandbox isolation.
|
| 141 |
+
|
| 142 |
+
Automatically picks the best available isolation method:
|
| 143 |
+
1. unshare with namespaces (Linux + CAP_SYS_ADMIN)
|
| 144 |
+
2. ulimit resource limits (fallback)
|
| 145 |
+
"""
|
| 146 |
+
if _CAN_USE_UNSHARE:
|
| 147 |
+
return _sandbox_command_unshare(cmd_string)
|
| 148 |
+
else:
|
| 149 |
+
return _sandbox_command_fallback(cmd_string)
|
| 150 |
+
|
| 151 |
+
# Command danger classification for auto-sandbox decisions
|
| 152 |
+
_DESTRUCTIVE_PATTERNS = [
|
| 153 |
+
r'\\brm\\b.*(-rf|-r|-fr|/)', # rm with recursive/force or absolute paths
|
| 154 |
+
r'\\bshred\\b',
|
| 155 |
+
r'\\bdd\\b.*of=',
|
| 156 |
+
r'\\bmkfs\\b',
|
| 157 |
+
r'\\bformat\\b',
|
| 158 |
+
r'\\bwipefs\\b',
|
| 159 |
+
r'\\bchmod\\b.*777',
|
| 160 |
+
r'\\bchown\\b.*-R',
|
| 161 |
+
r'\\bmv\\b.*/(boot|etc|usr|lib|bin|sbin)',
|
| 162 |
+
r'>\\s*/dev/',
|
| 163 |
+
r'\\bkill\\b.*(-9|-s\\s*9|SIGKILL)',
|
| 164 |
+
r'\\bpkill\\b',
|
| 165 |
+
r'\\bkillall\\b',
|
| 166 |
+
]
|
| 167 |
+
|
| 168 |
+
_NETWORK_PATTERNS = [
|
| 169 |
+
r'\\bcurl\\b.*\\bupload\\b',
|
| 170 |
+
r'\\bwget\\b',
|
| 171 |
+
r'\\bnc\\b',
|
| 172 |
+
r'\\bncat\\b',
|
| 173 |
+
r'\\bnmap\\b',
|
| 174 |
+
r'\\bpython[23]?\\b.*socket\\b',
|
| 175 |
+
r'\\bpython[23]?\\b.*requests\\.(post|put)',
|
| 176 |
+
r'\\bssh\\b.*(@|connect)',
|
| 177 |
+
r'\\bscp\\b',
|
| 178 |
+
r'\\brsync\\b',
|
| 179 |
+
r'\\bnc\\b.*-e',
|
| 180 |
+
]
|
| 181 |
+
|
| 182 |
+
def should_sandbox(command: str) -> bool:
|
| 183 |
+
"""Determine if a command should be sandboxed based on pattern matching.
|
| 184 |
+
|
| 185 |
+
Returns True for destructive, network-exfiltration, or process-management
|
| 186 |
+
commands that benefit from isolation.
|
| 187 |
+
"""
|
| 188 |
+
for pattern in _DESTRUCTIVE_PATTERNS + _NETWORK_PATTERNS:
|
| 189 |
+
if re.search(pattern, command, re.IGNORECASE):
|
| 190 |
+
return True
|
| 191 |
+
return False
|
| 192 |
+
|
| 193 |
+
'''
|
| 194 |
+
|
| 195 |
+
|
| 196 |
+
def patch_file(filepath: str) -> bool:
|
| 197 |
+
"""Patch local.py to add sandbox wrapping for dangerous commands."""
|
| 198 |
+
with open(filepath, "r") as f:
|
| 199 |
+
content = f.read()
|
| 200 |
+
|
| 201 |
+
if "sandbox_wrap" in content:
|
| 202 |
+
print(f" Already patched: {filepath}")
|
| 203 |
+
return True
|
| 204 |
+
|
| 205 |
+
applied = False
|
| 206 |
+
|
| 207 |
+
# ── Patch: Add sandbox wrapper code after imports ──
|
| 208 |
+
# Find a good insertion point: after the last import
|
| 209 |
+
import_section_end = content.rfind('\n\n')
|
| 210 |
+
if import_section_end > 0 and import_section_end < len(content) // 2:
|
| 211 |
+
insertion_point = import_section_end + 2
|
| 212 |
+
else:
|
| 213 |
+
# Fallback: after the module docstring
|
| 214 |
+
docstring_end = content.find('"""', content.find('"""') + 3)
|
| 215 |
+
if docstring_end > 0:
|
| 216 |
+
insertion_point = docstring_end + 3
|
| 217 |
+
else:
|
| 218 |
+
insertion_point = 0
|
| 219 |
+
|
| 220 |
+
content = content[:insertion_point] + "\n" + SANDBOX_WRAPPER_CODE + "\n" + content[insertion_point:]
|
| 221 |
+
applied = True
|
| 222 |
+
print(" [local.py] Added sandbox wrapper code")
|
| 223 |
+
|
| 224 |
+
# ── Patch: Hook sandbox into _run_bash method ──
|
| 225 |
+
# Find the _run_bash method and wrap commands that should be sandboxed
|
| 226 |
+
# We look for the line where cmd_string is passed to bash and inject
|
| 227 |
+
# a sandbox check before it.
|
| 228 |
+
|
| 229 |
+
# Pattern: in the _run_bash method, right before subprocess.Popen
|
| 230 |
+
# We want to wrap cmd_string if should_sandbox() returns True
|
| 231 |
+
|
| 232 |
+
# Find the Popen call in _run_bash
|
| 233 |
+
old_popen = "proc = subprocess.Popen(\n args,"
|
| 234 |
+
new_popen = (
|
| 235 |
+
" # Hermes Bot patch: auto-sandbox dangerous commands\n"
|
| 236 |
+
" if should_sandbox(cmd_string):\n"
|
| 237 |
+
" original_cmd = cmd_string\n"
|
| 238 |
+
" cmd_string = sandbox_wrap(cmd_string)\n"
|
| 239 |
+
" args = [bash, \"-c\", cmd_string]\n"
|
| 240 |
+
" logger.info(\"Sandbox isolation applied for dangerous command\")\n"
|
| 241 |
+
" proc = subprocess.Popen(\n"
|
| 242 |
+
" args,"
|
| 243 |
+
)
|
| 244 |
+
|
| 245 |
+
if old_popen in content:
|
| 246 |
+
content = content.replace(old_popen, new_popen, 1)
|
| 247 |
+
applied = True
|
| 248 |
+
print(" [local.py] Hooked sandbox into _run_bash subprocess.Popen")
|
| 249 |
+
else:
|
| 250 |
+
# Try alternative pattern (different indentation)
|
| 251 |
+
alt_popen = "proc = subprocess.Popen(\n args,"
|
| 252 |
+
if alt_popen in content:
|
| 253 |
+
content = content.replace(
|
| 254 |
+
alt_popen,
|
| 255 |
+
" # Hermes Bot patch: auto-sandbox dangerous commands\n"
|
| 256 |
+
" if should_sandbox(cmd_string):\n"
|
| 257 |
+
" cmd_string = sandbox_wrap(cmd_string)\n"
|
| 258 |
+
" args = [bash, \"-c\", cmd_string]\n"
|
| 259 |
+
" logger.info(\"Sandbox isolation applied for dangerous command\")\n"
|
| 260 |
+
" proc = subprocess.Popen(\n"
|
| 261 |
+
" args,",
|
| 262 |
+
1,
|
| 263 |
+
)
|
| 264 |
+
applied = True
|
| 265 |
+
print(" [local.py] Hooked sandbox into _run_bash (alt pattern)")
|
| 266 |
+
|
| 267 |
+
if applied:
|
| 268 |
+
with open(filepath, "w") as f:
|
| 269 |
+
f.write(content)
|
| 270 |
+
return True
|
| 271 |
+
else:
|
| 272 |
+
print(f" WARNING: Could not hook sandbox into {filepath}", file=sys.stderr)
|
| 273 |
+
# Still save with the sandbox code added
|
| 274 |
+
with open(filepath, "w") as f:
|
| 275 |
+
f.write(content)
|
| 276 |
+
return False
|
| 277 |
+
|
| 278 |
+
|
| 279 |
+
if __name__ == "__main__":
|
| 280 |
+
candidates = [
|
| 281 |
+
"/app/hermes-agent/tools/environments/local.py",
|
| 282 |
+
]
|
| 283 |
+
candidates.extend(
|
| 284 |
+
glob.glob("/app/venv/lib/**/tools/environments/local.py", recursive=True)
|
| 285 |
+
)
|
| 286 |
+
|
| 287 |
+
filepath = None
|
| 288 |
+
for c in candidates:
|
| 289 |
+
if os.path.isfile(c):
|
| 290 |
+
filepath = c
|
| 291 |
+
break
|
| 292 |
+
|
| 293 |
+
if not filepath:
|
| 294 |
+
print("WARNING: local.py not found", file=sys.stderr)
|
| 295 |
+
print(f"Checked: {candidates}", file=sys.stderr)
|
| 296 |
+
sys.exit(0)
|
| 297 |
+
|
| 298 |
+
ok = patch_file(filepath)
|
| 299 |
+
if ok:
|
| 300 |
+
print(f"\nSandbox isolation patch applied to {filepath}")
|
| 301 |
+
print(f" unshare available: {_CAN_USE_UNSHARE if 'sandbox_wrap' in dir() else 'unknown (runtime)'}")
|
| 302 |
+
print(f" Sandbox tmp: {_SANDBOX_TMP if '_SANDBOX_TMP' in dir() else '/tmp/hermes-sandbox'}")
|
| 303 |
+
else:
|
| 304 |
+
print("Patch partially failed", file=sys.stderr)
|
| 305 |
+
sys.exit(1)
|
start.sh
CHANGED
|
@@ -554,6 +554,9 @@ update_hermes_agent_background() {
|
|
| 554 |
if [ -f "/app/scripts/patch_strip_thinking_tags.py" ]; then
|
| 555 |
python3 /app/scripts/patch_strip_thinking_tags.py 2>/dev/null
|
| 556 |
fi
|
|
|
|
|
|
|
|
|
|
| 557 |
# Copy patch files if they exist
|
| 558 |
for patch_file in prompt_builder.py send_message_tool.py; do
|
| 559 |
if [ -f "/app/patches/hermes-agent/agent/$patch_file" ] && [ -f "$AGENT_DIR/agent/$patch_file" ]; then
|
|
|
|
| 554 |
if [ -f "/app/scripts/patch_strip_thinking_tags.py" ]; then
|
| 555 |
python3 /app/scripts/patch_strip_thinking_tags.py 2>/dev/null
|
| 556 |
fi
|
| 557 |
+
if [ -f "/app/scripts/patch_sandbox_isolation.py" ]; then
|
| 558 |
+
python3 /app/scripts/patch_sandbox_isolation.py 2>/dev/null
|
| 559 |
+
fi
|
| 560 |
# Copy patch files if they exist
|
| 561 |
for patch_file in prompt_builder.py send_message_tool.py; do
|
| 562 |
if [ -f "/app/patches/hermes-agent/agent/$patch_file" ] && [ -f "$AGENT_DIR/agent/$patch_file" ]; then
|