| Crates.io | safecrate |
| lib.rs | safecrate |
| version | 0.2.0 |
| created_at | 2025-10-19 16:09:32.606473+00 |
| updated_at | 2025-10-19 16:25:48.232981+00 |
| description | A CLI tool to safely open, build, and inspect untrusted source code in isolated Docker containers, protecting your system from potentially malicious projects. |
| homepage | |
| repository | https://github.com/0xsecaas/safecrate |
| max_upload_size | |
| id | 1890580 |
| size | 19,176 |
Safecrate is a CLI tool that lets you open and build untrusted source code in a secure, isolated Docker container. It prevents risky commands from running on your machine by providing a sandboxed environment with Rust, Neovim, and Rust Analyzer pre-configured.
⚠️ Security Notice: For maximum security, run Safecrate inside a VM. Docker isolation is strong but not infallible against kernel or daemon exploits.
# 1. Initialize the sandboxed environment
safecrate init
# 2. Open an untrusted project
safecrate open /path/to/untrusted_code
# 3. Resume a previous session
safecrate resume /path/to/untrusted_code
# 4. Clean up the container
safecrate remove /path/to/untrusted_code
safecrate init --dockerfile_PATH).# Example: Open a shell with no network access
safecrate open UNTRUSTED_DIR --cmd "bash" --no-network
Safecrate works by mounting the project directory into a Docker container, so all build tools and code analysis run in isolation, keeping your system safe.