firebox¶
Personal microVM sandbox-as-a-service. Spin up isolated Firecracker microVMs from Python or any MCP-aware agent, drive a real Chromium inside, throw them away when done.
flowchart LR
A["Your client / agent / MCP"] -- HTTP + bearer --> D["firebox-daemon"]
D --> V1["microVM"]
D --> V2["microVM"]
D --> V3["microVM"]
V1 -.fbr0 NAT.-> Net((Internet))
V2 -.fbr0 NAT.-> Net
V3 -.fbr0 NAT.-> Net
classDef sandbox fill:#ff7043,stroke:#bf360c,color:#fff
class V1,V2,V3 sandbox
What you get¶
- ~170 ms cold start on bare-metal KVM
- Real isolation — each sandbox is a Firecracker microVM with its own kernel, RAM, rootfs, and network namespace
- One Python SDK that talks HTTP — no SSH, no Playwright on the caller
- Multi-tenant from day one — per-token quotas, scoped sandbox visibility, admin / user roles
- MCP server so Claude Desktop, Cursor, or any MCP-aware agent gets 22 native tools the moment you point it at the daemon
- Stealth-by-default browser — passes bot.sannysoft.com fingerprint checks, real-Chrome TLS via curl_cffi, audio-captcha solver via local Whisper
Two-minute version¶
On a KVM-capable Linux box
curl -fsSL https://raw.githubusercontent.com/LovroK23/firebox/main/scripts/firebox-host-bootstrap.sh \
| sudo bash
# → prints token + endpoint
From any laptop / server
pip install git+ssh://git@github.com/LovroK23/firebox.git
export FIREBOX_URL=https://firebox.example.com
export FIREBOX_TOKEN=<the-secret-printed-above>
firebox doctor
And you're cooking
from firebox.sandbox import Sandbox
with Sandbox.create(template="browser-use", ttl_seconds=600) as sb:
sb.browser.start()
sb.browser.navigate("https://example.com")
print(sb.browser.text("h1")) # → "Example Domain"
Where to next?¶
Spin up your first sandbox end-to-end in five minutes.
Every capability with a 5-line example: run, stream, files, browser, http, search, audio, captcha.
Worked patterns: web research, code interpreter, scraping, lead-gen, multi-turn sessions, MCP plug-in.
Daemon, in-VM agent, network bridge, registry. The whole flow.
Deploy the daemon on your own KVM box.
Multi-tenant access, scoped sandboxes, resource caps.
Every CLI subcommand, the full SDK surface, all 22 MCP tools.