Every task runs in its own isolated sandbox. Sandboxes are ephemeral: spun up for the task, destroyed when it’s done. No code or state persists after execution.Documentation Index
Fetch the complete documentation index at: https://test-8862363a-tembo-update-docs-with-this-weeks-commits.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Sandbox types
Small (default)
Container-based. Fast startup, scalable, no infrastructure to manage.- Workloads run as non-root
- Docker daemon is not exposed inside the sandbox
- Each task gets its own isolated network namespace
- Standard container hardening best practices
Large (Full VM)
Dedicated Linux VM per task. No two tasks share the same VM.- 4 vCPU / 8 GB RAM (adjustable)
- 100 GB disk
- Full nested virtualization (Docker-in-Docker)
- Stronger isolation boundary
Pre-installed tools
Both sandbox types come with:| Category | Tools |
|---|---|
| JavaScript | Node.js 22, Bun, pnpm, Yarn |
| Python | Python 3.12, pipx, uv, ruff |
| Ruby | Ruby 3.3, Bundler, RuboCop |
| .NET | .NET SDK 9 |
| Cloud | Google Cloud SDK |
| Containers | Docker 28, Docker Compose 2.31 (Large VM only) |
| Other | Git, curl, ShellCheck, httpie |
Go, Rust, Java, and Elixir are available through Nix dev shells. Add a
flake.nix to install language-specific tooling for your project.Add custom dependencies
To add custom dependencies in the sandbox, include aflake.nix with devShells.x86_64-linux.default. Tembo automatically detects it and runs commands inside your Nix dev shell.
Here is a minimal flake.nix example you can copy and adapt: