“OS-Level Isolation for AI Agents. Really awesome work and resource here”
Chris Hughes
VP, Security Strategy @ Zenity
OS-enforced sandboxing for untrusted AI agents and processes.
“OS-Level Isolation for AI Agents. Really awesome work and resource here”
Chris Hughes
VP, Security Strategy @ Zenity
“Neat project, thanks for sharing! I like the OS-specific security primitives, useful built-in profiles, and being able to customize what's allowed/blocked.”
Clint Gibler
Head of Security Research at Semgrep
“nono hits the real problem: agents shouldn’t inherit full user trust by default. Treating them like untrusted processes, with deny-by-default filesystem, network, and secrets access, feels like the right baseline going forward.”
snapsec
Centralising Application Security
“Beautiful work! It is encouraging to see kernel security being taken seriously, especially during this current episode of OpenClaw and Moltbot. ”
Cuong Nguyen
Cloud Architect and System Engineer
Looking for how to secure OpenClaw?
Head over hereUnlike policy-based sandboxes that intercept and filter operations, nono leverages OS security primitives to create an environment where unauthorized operations are structurally impossible.
Once inside nono, there is no mechanism to bypass restrictions. The agent cannot request more permissions because the mechanism doesn't exist.
Works with any AI agent. Actually, more than that. It works with any process you want to sandbox.
Kernel denies unauthorized operations directly. No interception, no filtering - operations are structurally impossible.
Linux support via Landlock and macOS support via Seatbelt. Native OS security primitives for maximum reliability.
nono follows a capability-based security model. You grant explicit capabilities, and the OS enforces them at the kernel level.

You start nono with explicit capabilities for the paths you want to allow.
OS-level restrictions are applied. This is irreversible for the process.
The command runs with only granted capabilities. All children inherit restrictions.
Get up and running in seconds.
brew tap lukehinds/nono
brew install nonoBuilding from source requires Rust toolchain. See the docs for more installation options.
nono uses native OS security primitives for maximum reliability and performance.
via Seatbelt
Supported
via Landlock
Supported
Windows support is planned for a future release.