+0.34 We Built Secure, Scalable Agent Sandbox Infrastructure (browser-use.com S:+0.65 )
75 points by gregpr07 2 days ago | 16 comments on HN | Moderate positive Contested Editorial · v3.7 · 2026-02-28 11:23:10 0
Summary Privacy & System Security Acknowledges
This technical blog post describes Browser Use's secure sandbox infrastructure for AI agents, with primary engagement on UDHR Article 12 (privacy protection) through detailed discussion of credential segregation, environment isolation, and controlled access mechanisms, and Article 30 (abuse prevention) through multiple security hardening layers. While not explicitly framed in human rights language, the article's architecture embodies privacy-protective and security-conscious design principles aligned with UDHR protections.
Article Heatmap
Preamble: ND — Preamble Preamble: No Data — Preamble P Article 1: ND — Freedom, Equality, Brotherhood Article 1: No Data — Freedom, Equality, Brotherhood 1 Article 2: ND — Non-Discrimination Article 2: No Data — Non-Discrimination 2 Article 3: +0.20 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: ND — Right to Remedy Article 8: No Data — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.76 — Privacy 12 Article 13: ND — Freedom of Movement Article 13: No Data — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: +0.20 — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: ND — Freedom of Expression Article 19: No Data — Freedom of Expression 19 Article 20: ND — Assembly & Association Article 20: No Data — Assembly & Association 20 Article 21: ND — Political Participation Article 21: No Data — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: -0.10 — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: ND — Standard of Living Article 25: No Data — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: +0.30 — Cultural Participation 27 Article 28: ND — Social & International Order Article 28: No Data — Social & International Order 28 Article 29: +0.30 — Duties to Community 29 Article 30: +0.66 — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.34 Structural Mean +0.65
Weighted Mean +0.40 Unweighted Mean +0.33
Max +0.76 Article 12 Min -0.10 Article 23
Signal 7 No Data 24
Volatility 0.27 (High)
Negative 1 Channels E: 0.6 S: 0.4
SETL +0.27 Editorial-dominant
FW Ratio 58% 15 facts · 11 inferences
Evidence 15% coverage
2H 4M 1L 24 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.00 (0 articles) Security: 0.20 (1 articles) Legal: 0.00 (0 articles) Privacy & Movement: 0.76 (1 articles) Personal: 0.20 (1 articles) Expression: 0.00 (0 articles) Economic & Social: -0.10 (1 articles) Cultural: 0.30 (1 articles) Order & Duties: 0.48 (2 articles)
HN Discussion 6 top-level · 6 replies
yakkomajuri 2026-02-27 20:01 UTC link
I think this is pretty standard and similar to approaches that are evolving naturally (I've certainly used very similar patterns).

I'd be pretty keen to actually hear more about the Unikraft setup and other deeper details about the agent sandboxes regarding the tradeoffs and optimizations made. All the components are there but has someone open-sourced a more plug-and-play setup like this?

Bnjoroge 2026-02-27 20:02 UTC link
maybe the usecase that makes unikernels alot more mainstream. Always found them intriguing
jeremyjacob 2026-02-27 20:05 UTC link
It’s neat to see more projects adopting Unikernals. I’ve played around with Unikraft’s Cloud offering about a year ago when it was CLI/API only and was impressed by the performance but found too many DX and polish issues to take it to production. Looks like they’ve improved a lot of that since.
orf 2026-02-27 20:31 UTC link
The first 3 “hardening” points are not great.

Essentially it’s just: remove .py files an execute del os.environ[“SESSION_TOKEN“]? This doesn’t really sound very secure, there are a number of ways to bypass both of these.

It’s just security through obscurity

cedws 2026-02-27 21:33 UTC link
The billion engineers building sandbox tools at the moment are missing the point. Sandboxing doesn't matter when the LLM is vulnerable to prompt injection. Every MCP server you install, every webpage it fetches, every file it reads is a threat. Yeah you can sit there and manually approve every action it takes, but then how is any of this useful when you have to supervise it constantly? Even Anthropic say that this doesn't work because reviewing every action leads to exhaustion and rubber stamping.

The problem is not what the LLM shouldn't have access to, it's what it does have access to.

The usefulness of LLMs is severely limited while they lack the ability to separate instructions and data, or as Yann LeCun said, predict the consequences of their actions.

mcpmarketplace 2026-02-28 05:53 UTC link
This resonates. Pattern 2 (full agent isolation) handles the runtime threat, but there's a gap upstream. The MCP ecosystem has thousands of servers now and zero vetting. You find a repo, hope it's legit, and give it system access. Sandboxing won't help if the tool itself is designed to exfiltrate data through legitimate-looking API calls.

The missing layer is pre-installation scanning. Runtime isolation + supply chain vetting together is the real answer.

eyberg 2026-02-27 20:55 UTC link
Except this is very clearly running linux.
logicx24 2026-02-27 22:08 UTC link
Yup. I just wrote about this last week: https://tachyon.so/blog/sandboxes-wont-save-you

Of all the problems in agent security, sandboxing solves the easiest problem.

nderjung 2026-02-27 22:10 UTC link
Howdy! We are hard at work at improving the DX, and as a result we've been working on a brand new CLI. We haven't made any announcements yet, but it's already open-source for early adopts if you'd like to give it a try!

https://github.com/unikraft/cli

Feedback is very much appreciated, we're listening! :)

CuriouslyC 2026-02-28 02:37 UTC link
Prompt injection is hard but I believe tractable. I've found that by having a canary agent transform insecure input into a structured format with security checks, you can achieve good isolation and mitigation. More at https://sibylline.dev/articles/2026-02-22-schema-strict-prom...
LarsenCC 2026-02-28 02:48 UTC link
Fair point, and you're right that those three steps alone aren't a security boundary. They're defense-in-depth, not the primary isolation.

The actual security model is the architecture itself: the sandbox runs in its own VM inside a private VPC. It has no AWS keys, no database credentials, no LLM API tokens. The only thing it can do is talk to the control plane, which validates every request and scopes every operation to that one session.

So even if you bypass all three hardening steps, you get a session token that only works inside that VPC, talking to a control plane that only lets you do things scoped to your own session. There's nothing to escalate to.

The bytecode removal, privilege drop, and env stripping are just there to make the agent's life harder if it tries to inspect its own runtime. Not the security boundary.

LarsenCC 2026-02-28 02:58 UTC link
Agreed, the pattern is converging across the industry. The Unikraft setup is where it gets interesting for us with sub-second boots (or sub 100ms even), scale-to-zero that suspends the VM after a few seconds of idle (frees resources), and dedicated bare metal in AWS so we're not sharing hardware.

We haven't open-sourced the control plane glue yet but it's something we're thinking about. browser-use itself is open source. The sandbox infra on top is the proprietary part for now.

Editorial Channel
What the content says
+0.80
Article 12 Privacy
High Advocacy Practice
Editorial
+0.80
SETL
+0.28

Article 12 protects privacy from arbitrary interference and attacks. The article extensively discusses privacy-protective architecture: isolating agents from secrets, preventing credential exposure, strictly limiting environment variable access, and implementing a control plane that serves as a gateway for all external communication.

+0.70
Article 30 No Destruction of Rights
High Advocacy Practice
Editorial
+0.70
SETL
+0.26

Article 30 prohibits any interpretation of the Declaration that permits the destruction of the rights and freedoms set forth. The article extensively discusses preventing abuse, unauthorized access, and system compromise through multiple layers of security architecture and hardening measures.

+0.30
Article 27 Cultural Participation
Medium Advocacy
Editorial
+0.30
SETL
ND

Article 27 provides the right to participate in the cultural life of the community and in scientific advancement and its benefits. The article contributes to collective knowledge about secure infrastructure design and shares technical patterns that advance security engineering understanding.

+0.30
Article 29 Duties to Community
Medium Advocacy
Editorial
+0.30
SETL
ND

Article 29 describes duties to the community and the principle that rights are limited to the extent necessary to secure respect for the rights and freedoms of others. The article implicitly addresses responsible infrastructure design and the duty to prevent harm through secure architecture.

+0.20
Article 3 Life, Liberty, Security
Medium Advocacy
Editorial
+0.20
SETL
ND

Article 3 addresses the right to life, liberty, and personal security. The article discusses security architecture that protects systems from unauthorized access and compromise.

+0.20
Article 17 Property
Medium Advocacy
Editorial
+0.20
SETL
ND

Article 17 protects the right to own property and freedom from arbitrary deprivation thereof. The article discusses protecting data and digital assets through controlled file access and credential-free storage mechanisms.

-0.10
Article 23 Work & Equal Pay
Low
Editorial
-0.10
SETL
ND

Article 23 protects the right to work, free choice of employment, just and favorable working conditions. The article describes agents automating work tasks but engages only with technical implementation, not labor rights or fair working conditions.

ND
Preamble Preamble

The Preamble affirms the inherent dignity and equal rights of all members of the human family. This technical article does not engage with concepts of human dignity or universal human rights.

ND
Article 1 Freedom, Equality, Brotherhood

Article 1 establishes equal dignity and rights of all without distinction. The article does not address human equality or non-discrimination.

ND
Article 2 Non-Discrimination

Article 2 prohibits discrimination. This technical article does not address discrimination.

ND
Article 4 No Slavery

Article 4 prohibits slavery and servitude. Not relevant to this technical article.

ND
Article 5 No Torture

Article 5 prohibits torture and cruel treatment. Not relevant to this technical article.

ND
Article 6 Legal Personhood

Article 6 affirms the right to recognition as a person before the law. Not relevant to this technical article.

ND
Article 7 Equality Before Law

Article 7 provides equality before the law. Not relevant to this technical article.

ND
Article 8 Right to Remedy

Article 8 establishes the right to effective remedy by judicial authorities. Not relevant to this technical article.

ND
Article 9 No Arbitrary Detention

Article 9 prohibits arbitrary arrest and detention. Not relevant to this technical article.

ND
Article 10 Fair Hearing

Article 10 guarantees the right to a fair and public hearing by an independent tribunal. Not relevant to this technical article.

ND
Article 11 Presumption of Innocence

Article 11 addresses criminal procedure and presumption of innocence. Not relevant to this technical article.

ND
Article 13 Freedom of Movement

Article 13 provides freedom of movement within the borders of each state. Not relevant to this technical article.

ND
Article 14 Asylum

Article 14 provides the right to seek and enjoy asylum from persecution. Not relevant to this technical article.

ND
Article 15 Nationality

Article 15 addresses the right to a nationality. Not relevant to this technical article.

ND
Article 16 Marriage & Family

Article 16 protects the rights of marriage and family. Not relevant to this technical article.

ND
Article 18 Freedom of Thought

Article 18 protects freedom of thought, conscience, and religion. Not relevant to this technical article.

ND
Article 19 Freedom of Expression

Article 19 protects freedom of opinion and expression. This technical article does not address freedom of expression or opinion in the UDHR sense.

ND
Article 20 Assembly & Association

Article 20 protects freedom of peaceful assembly and association. Not relevant to this technical article.

ND
Article 21 Political Participation

Article 21 provides the right to take part in government and governance. Not relevant to this technical article.

ND
Article 22 Social Security

Article 22 provides the right to social security and realization of economic, social, and cultural rights. Not relevant to this technical article.

ND
Article 24 Rest & Leisure

Article 24 provides the right to rest and leisure and periodic holidays with pay. Not relevant to this technical article.

ND
Article 25 Standard of Living

Article 25 provides the right to a standard of living adequate for health and well-being, including food, clothing, housing, and medical care. Not relevant to this technical article.

ND
Article 26 Education

Article 26 protects the right to education and free elementary education. Not relevant to this technical article.

ND
Article 28 Social & International Order

Article 28 establishes that everyone is entitled to a social and international order in which the rights and freedoms can be fully realized. Not directly relevant to this technical article.

Structural Channel
What the site does
+0.70
Article 12 Privacy
High Advocacy Practice
Structural
+0.70
Context Modifier
ND
SETL
+0.28

The product architecture materially implements privacy protections through credential segregation, privilege restrictions, environment stripping, and network isolation.

+0.60
Article 30 No Destruction of Rights
High Advocacy Practice
Structural
+0.60
Context Modifier
ND
SETL
+0.26

Multiple architectural layers prevent abuse and unauthorized system access through bytecode execution controls, privilege restrictions, and network isolation.

ND
Preamble Preamble

No structural observations relevant to the Preamble.

ND
Article 1 Freedom, Equality, Brotherhood

No relevant structural signals.

ND
Article 2 Non-Discrimination

No relevant structural signals.

ND
Article 3 Life, Liberty, Security
Medium Advocacy

Product implements security protections against unauthorized system access.

ND
Article 4 No Slavery

No relevant structural signals.

ND
Article 5 No Torture

No relevant structural signals.

ND
Article 6 Legal Personhood

No relevant structural signals.

ND
Article 7 Equality Before Law

No relevant structural signals.

ND
Article 8 Right to Remedy

No relevant structural signals.

ND
Article 9 No Arbitrary Detention

No relevant structural signals.

ND
Article 10 Fair Hearing

No relevant structural signals.

ND
Article 11 Presumption of Innocence

No relevant structural signals.

ND
Article 13 Freedom of Movement

No relevant structural signals.

ND
Article 14 Asylum

No relevant structural signals.

ND
Article 15 Nationality

No relevant structural signals.

ND
Article 16 Marriage & Family

No relevant structural signals.

ND
Article 17 Property
Medium Advocacy

Architecture protects data assets through access controls and prevents unauthorized credential exposure.

ND
Article 18 Freedom of Thought

No relevant structural signals.

ND
Article 19 Freedom of Expression

Blog article is publicly published, but article content itself does not address free expression rights.

ND
Article 20 Assembly & Association

No relevant structural signals.

ND
Article 21 Political Participation

No relevant structural signals.

ND
Article 22 Social Security

No relevant structural signals.

ND
Article 23 Work & Equal Pay
Low

Product enables task automation but article does not address labor rights implications.

ND
Article 24 Rest & Leisure

No relevant structural signals.

ND
Article 25 Standard of Living

No relevant structural signals.

ND
Article 26 Education

No relevant structural signals.

ND
Article 27 Cultural Participation
Medium Advocacy

Public blog post makes technical security knowledge available for broad adoption.

ND
Article 28 Social & International Order

No relevant structural signals.

ND
Article 29 Duties to Community
Medium Advocacy

Architecture embodies security best practices intended to prevent misuse and protect others' systems.

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.72 medium claims
Sources
0.7
Evidence
0.8
Uncertainty
0.6
Purpose
0.9
Propaganda Flags
No manipulative rhetoric detected
0 techniques detected
Emotional Tone
Emotional character: positive/negative, intensity, authority
measured
Valence
+0.3
Arousal
0.4
Dominance
0.7
Transparency
Does the content identify its author and disclose interests?
1.00
✓ Author
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.82 solution oriented
Reader Agency
0.7
Stakeholder Voice
Whose perspectives are represented in this content?
0.20 1 perspective
Speaks: corporation
Temporal Framing
Is this content looking backward, at the present, or forward?
present immediate
Geographic Scope
What geographic area does this content cover?
global
AWS
Complexity
How accessible is this content to a general audience?
technical high jargon domain specific
Longitudinal 418 HN snapshots · 31 evals
+1 0 −1 HN
Audit Trail 51 entries
2026-03-02 03:39 eval_success Evaluated: Mild positive (0.22) - -
2026-03-02 03:39 model_divergence Cross-model spread 0.40 exceeds threshold (3 models) - -
2026-03-02 03:39 eval Evaluated by deepseek-v3.2: +0.22 (Mild positive) 8,484 tokens +0.22
2026-03-02 01:02 dlq_auto_replay DLQ auto-replay: message 98000 re-enqueued - -
2026-03-01 21:02 eval_success Evaluated: Neutral (0.00) - -
2026-03-01 21:02 model_divergence Cross-model spread 0.40 exceeds threshold (3 models) - -
2026-03-01 21:02 eval Evaluated by deepseek-v3.2: 0.00 (Neutral) 8,808 tokens 0.00
2026-03-01 21:02 rater_validation_warn Validation warnings for model deepseek-v3.2: 31W 31R - -
2026-03-01 18:18 eval_success Evaluated: Neutral (0.00) - -
2026-03-01 18:18 model_divergence Cross-model spread 0.40 exceeds threshold (3 models) - -
2026-03-01 18:18 eval Evaluated by deepseek-v3.2: 0.00 (Neutral) 9,731 tokens -0.14
2026-03-01 17:50 eval_success Evaluated: Mild positive (0.14) - -
2026-03-01 17:50 model_divergence Cross-model spread 0.40 exceeds threshold (3 models) - -
2026-03-01 17:50 eval Evaluated by deepseek-v3.2: +0.14 (Mild positive) 8,871 tokens -0.05
2026-03-01 02:47 model_divergence Cross-model spread 0.40 exceeds threshold (4 models) - -
2026-03-01 02:47 eval_success Evaluated: Mild positive (0.19) - -
2026-03-01 02:47 rater_validation_warn Validation warnings for model deepseek-v3.2: 0W 52R - -
2026-03-01 02:47 eval Evaluated by deepseek-v3.2: +0.19 (Mild positive) 8,835 tokens -0.18
2026-03-01 02:01 dlq_auto_replay DLQ auto-replay: message 97906 re-enqueued - -
2026-03-01 00:45 eval_success Evaluated: Moderate positive (0.37) - -
2026-03-01 00:45 model_divergence Cross-model spread 0.40 exceeds threshold (4 models) - -
2026-03-01 00:45 eval Evaluated by deepseek-v3.2: +0.37 (Moderate positive) 8,848 tokens
2026-02-28 21:20 dlq Dead-lettered after 1 attempts: We Built Secure, Scalable Agent Sandbox Infrastructure - -
2026-02-28 21:20 eval_failure Evaluation failed: AbortError: The operation was aborted - -
2026-02-28 20:37 eval_failure Evaluation failed: AbortError: The operation was aborted - -
2026-02-28 18:35 dlq Dead-lettered after 1 attempts: We Built Secure, Scalable Agent Sandbox Infrastructure - -
2026-02-28 15:37 eval Evaluated by llama-4-scout-wai: +0.10 (Mild positive) 0.00
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 15:23 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 12:25 eval Evaluated by llama-4-scout-wai: +0.10 (Mild positive) 0.00
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 11:23 eval Evaluated by claude-haiku-4-5-20251001: +0.40 (Moderate positive)
2026-02-28 10:34 eval Evaluated by llama-4-scout-wai: +0.10 (Mild positive) 0.00
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 09:15 eval Evaluated by llama-4-scout-wai: +0.10 (Mild positive) 0.00
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 08:11 eval Evaluated by llama-4-scout-wai: +0.10 (Mild positive) 0.00
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 07:57 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 06:38 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 06:25 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 05:58 eval Evaluated by llama-4-scout-wai: +0.10 (Mild positive) 0.00
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 05:45 eval Evaluated by llama-4-scout-wai: +0.10 (Mild positive) +0.10
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 05:44 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 05:35 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 05:15 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 04:38 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 03:18 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 02:52 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 02:46 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 02:18 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 02:09 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 01:53 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Tech tutorial on sandboxing agents
2026-02-28 01:36 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral)
reasoning
Tech tutorial on sandboxing agents
2026-02-28 01:17 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
reasoning
ED, tech tutorial with implicit security focus
2026-02-28 01:05 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral)
reasoning
ED, tech tutorial with implicit security focus