Hanzo Dev

Sandboxing

How Hanzo Dev sandboxes command execution for safety.

Sandbox & Approvals

Hanzo Dev enforces sandboxing to prevent unintended side effects when the agent executes commands.

Sandbox Modes

ModeDescription
offNo sandboxing (commands run directly)
workspace-readRead-only access to workspace
workspace-writeRead/write access to workspace (default for full-auto)
network-offDisable network access
danger-full-accessFull access (use with caution)

Approval Policies

PolicyDescription
alwaysAlways ask for approval
on-failureAsk only on command failure
on-requestAsk when model requests approval
neverNever ask for approval

Usage

# Read-only mode (safest)
dev --sandbox workspace-read "analyze this codebase"

# Write mode with approval on failure
dev --sandbox workspace-write --ask-for-approval on-failure "refactor"

# Full auto (sandboxed writes, auto-approve)
dev --full-auto "fix all linting errors"

# Bypass all safety (DANGEROUS)
dev --dangerously-bypass-approvals-and-sandbox "your prompt"

Mid-Session Changes

Change approval level during a conversation with /approvals in the TUI.

On this page