--enable).
Core Integrations (Always Enabled)
These integrations are included in every Agent Safehouse policy:Git
Git configuration and SSH keys for git-over-ssh
SCM CLIs
GitHub CLI (
gh) and GitLab CLI (glab)Launch Services
macOS UTI resolution and app launching
Container Runtime Deny
Default-deny for Docker/Podman (must be explicitly enabled)
Git Integration
The Git profile provides read-only access to Git configuration and minimal SSH metadata:The Git profile does NOT grant access to SSH private keys. For SSH key access, enable the SSH integration with
--enable=ssh.SCM CLI Integration
GitHub CLI (gh) and GitLab CLI (glab) for repository automation:
Optional Integrations
Optional integrations must be explicitly enabled with--enable=<name>:
Docker
Enable with:--enable=docker
Grants access to Docker daemon sockets and configuration:
Kubernetes (kubectl)
Enable with:--enable=kubectl
Grants access to kubeconfig, cluster certificates, and kubectl cache:
SSH
Enable with:--enable=ssh
Grants access to SSH agent sockets while blocking private key access:
The SSH profile uses defense-in-depth: it blocks
~/.ssh entirely, then selectively allows non-sensitive files like config and known_hosts. Private keys remain inaccessible.Clipboard
Enable with:--enable=clipboard
Grants access to macOS pasteboard for pbcopy and pbpaste:
Other Optional Integrations
Process Control
Process Control
Enable with:
--enable=process-controlGrants broader process introspection and control beyond the sandbox:process-info-pidinfo: Monitor all processesprocess-info-setcontrol: Control process metadata
Shell Init
Shell Init
Enable with:
--enable=shell-initAllows reading shell startup files:~/.bashrc,~/.bash_profile,~/.zshrc,~/.zshenv~/.profile,~/.config/fish/config.fish
Keychain
Keychain
Enable with:
--enable=keychainGrants access to macOS Keychain for reading stored credentials:com.apple.SecurityServer: Keychain daemoncom.apple.securityd: Security services
Cloud Credentials
Cloud Credentials
Enable with:
--enable=cloud-credentialsGrants access to cloud provider credential files:~/.aws(AWS CLI)~/.azure(Azure CLI)~/.config/gcloud(Google Cloud)~/.kube(Kubernetes)
macOS GUI
macOS GUI
Enable with:
--enable=macos-guiGrants accessibility and screen recording permissions for GUI automation:- Accessibility API access
- Screen recording
- Window management
Spotlight
Spotlight
Enable with:
--enable=spotlightGrants access to macOS Spotlight search API:com.apple.metadata.mds: Spotlight daemon
mdfindLLDB
LLDB
Enable with:
--enable=lldbGrants debugger access for native code debugging:- LLDB configuration and scripts
- Debug symbol cache
Electron
Electron
Enable with:
--enable=electronGrants Electron app runtime permissions (implies macos-gui):- Electron cache
- GPU/rendering services
Chromium (Headless)
Chromium (Headless)
Enable with:
--enable=chromium-headlessMinimal Chromium permissions for headless browser automation:- No GPU acceleration
- Minimal mach services
Chromium (Full)
Chromium (Full)
Enable with:
--enable=chromium-fullFull Chromium permissions including GPU and audio:- GPU acceleration
- Audio output
- Camera/microphone (if needed)
1Password
1Password
Enable with:
--enable=1passwordGrants access to 1Password CLI (op):~/.config/op~/.cache/op
High-Risk Integrations
Some integrations grant significant system access and should be used with caution:Docker
Risk: Container escape, host filesystem accessMitigation: Only enable for container workflows
SSH
Risk: SSH agent access (not keys themselves)Mitigation: Private keys are blocked; only agent socket allowed
Keychain
Risk: Access to stored passwords and certificatesMitigation: Only enable if agent needs credential access
Cloud Credentials
Risk: Cloud API access with user’s permissionsMitigation: Monitor agent cloud operations closely
Multiple Integrations
You can enable multiple integrations simultaneously:Integration Dependencies
Some integrations automatically enable dependencies:electron→ impliesmacos-guichromium-full→ implies GPU and audio services- Agent profiles → may imply
keychainif they require credential access
Authoring Custom Integration Profiles
To create a custom integration:-
Choose the right directory:
50-integrations-core/: Always enabled (use sparingly)55-integrations-optional/: Opt-in via--enable
-
Create your profile:
profiles/55-integrations-optional/my-integration.sb -
Add standard header:
-
Grant minimal permissions:
-
Consider defense-in-depth:
-
Regenerate and test:
Best Practices
Enable only what you need
Each integration increases the attack surface. Only enable integrations your workflow requires.
Understand the risks
Review the “High-Risk Integrations” section before enabling Docker, Keychain, or cloud credentials.
Use defense-in-depth
When authoring integrations, deny sensitive paths first, then allow safe subsets.
Test thoroughly
Always test custom integrations with real workflows before deploying to production agents.
Related Profiles
Toolchains
Language-specific package managers and build tools
System Runtime
Foundation for process execution and system access