II.
Sandbox JSON
Structured · livesandbox:permissive-developer
Permissive developer sandbox json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "sandbox:permissive-developer",
"_kind": "Sandbox",
"_file": "lifecycle/sandboxes/example-sandbox-default-container.yaml",
"_cluster": "lifecycle",
"attributes": {
"displayName": "Permissive developer sandbox",
"filesystemPolicy": "read-write",
"networkPolicy": "full",
"description": "Loose policy used for trusted local developer execution. Captures\naudit telemetry but does not gate calls.\n",
"fsAllowList": [],
"fsDenyList": [
"**/.ssh/**",
"**/.aws/credentials"
],
"netAllowList": [],
"netDenyList": [],
"execAllowedBinaries": [],
"execDeniedBinaries": [],
"envVarScope": "inherit-all",
"secretAccessScope": "all",
"auditLogPolicy": "structured-jsonl",
"policyEvaluationPoint": "post-call-attestation"
},
"outgoingEdges": [
{
"from": "sandbox:permissive-developer",
"to": "layer:9-sandbox",
"kind": "realizes",
"attributes": {}
}
],
"incomingEdges": []
}