2/1/2026 at 9:26:03 PM
I rushed out nono.sh (the opposite of yolo!) in response to this and its already negated a few gateway attacks.It uses kernel-level security primitives (Landlock on Linux, Seatbelt on macOS) to create sandboxes where unauthorized operations are structurally impossible. API keys are also stored in apples secure enclave (or the kernel keyring in linux) , and injected at run time and zeroized from memory after use. There is also some blocking of destructive actions (rm -rf ~/)
its as simple to run as: nono run --profile openclaw -- openclaw gateway
You can also use it to sandbox things like npm install:
nono run --allow node_modules --allow-file package.json package.lock npm install pkg
Its early in, there will be bugs! PR's welcome and all that!
by decodebytes
2/1/2026 at 9:34:46 PM
Heads up that your url is wrong. Should be https://nono.shby stijnveken
2/1/2026 at 9:40:30 PM
lol thanks! seriously, I have been running the tool over and over while testing and I kept typing 'nano' and opening binaries in the text editor. Next minute I swearing my head off trying to close nano (and not vim!)by decodebytes
2/1/2026 at 10:08:47 PM
Obviously I'm biased but this looks really useful.by hedgehog
2/1/2026 at 9:29:37 PM
Is this better than using sandbox-exec (on mac) directly?by krackers
2/1/2026 at 9:41:37 PM
Hmm, I don't know about better, more convenient I guess. But if it floats your boat you could write out everything in the sb format and call sandbox_exec()!by decodebytes
2/2/2026 at 12:38:42 AM
Why not use containers (eg. Podman) with secrets management?by Wuzado