Stay Up to Date
Subscribe to our newsletter
AI coding assistants are at their most powerful when you take the brakes off. Autonomous mode --dangerously-skip-permissions in Claude Code, or equivalent in other tools, is where spec-driven frameworks like GSD, SuperClaude, and BMAD actually deliver. It’s where agents stop asking for permission on every file write and start building.
“Take the brakes off” means exactly what it sounds like. On a developer’s machine, an autonomous AI agent has access to everything the developer does: SSH keys, cloud credentials, browser sessions, email. For most software shops, that’s a calculated risk. For a blockchain company, it’s existential. Private keys controlling on-chain funds, deployment credentials for smart contract infrastructure, API secrets for production systems. These aren’t just sensitive, they’re the kind of assets where a single leak is irreversible.
So developers face three bad choices:

Multipass Sandbox introduces a different approach: contain the AI agent in a full VM with real isolation, but preserve every DX flow that modern developers expect.
mps up
That gives you a full Ubuntu VM with Docker, language runtimes, and dev tools pre-configured. Your working directory is auto-mounted at the same absolute path. The sandbox names itself from your project folder. VS Code connects over SSH. Port forwarding works. npm run dev previews in your browser. The agent runs autonomously inside the VM, and your host machine’s credentials, keys, and secrets stay outside the blast radius.
It runs natively on macOS and Linux. Windows developers use it through WSL2.
Sandboxes are disposable by design. When an image gets stale or something breaks, the answer is mps destroy && mps up, not a debugging session. Cloud-init templates live in your repo, so every developer on the team gets the same environment: same packages, same tooling, same state. No more two-day onboarding sessions getting a new engineer’s machine to match everyone else’s.
We ship four pre-built image flavors, layered so you carry only what the work requires:
base protocol-devsmart-contract-devsmart-contract-auditThe audit flavor deserves a specific callout. These are the static analysis and fuzzing tools that matter for smart contract security work: pre-installed, pre-configured, ready to run. No setup, no version conflicts, no dependency chasing.
Configuration cascades from shipped defaults through user globals, per-project .mps.env files, resource profiles, and CLI flags. Profiles auto-scale CPU and memory as fractions of your host hardware, so a lite profile on a 16-thread machine allocates more than on a 4-thread laptop, without anyone editing config files.
We built Multipass Sandbox with Claude Code in a few weeks of after-hours work. Our estimate for the same scope without AI was roughly two months. The CI/CD pipeline alone, covering multi-arch image builds, validation, and distribution to Backblaze B2, was implemented in half a day.
That’s not a testament to AI writing code for us. The prototype came fast, one-shot working code from a detailed implementation plan. The remaining 80% was hardening to production grade: edge cases, cross-platform compatibility (Bash 3.2+ for macOS), error handling, test coverage above 90%. Claude accelerated each iteration cycle, but the cycles still happened. Planning and architecture mattered more with AI, not less. Claude will confidently go down the wrong path if you don’t steer.
The tool is itself a proof of its own thesis:
AI agents are a genuine productivity multiplier for skilled engineers, and having an isolated environment where those agents can run autonomously is what makes that leverage safe to use.
Multipass Sandbox is released under the Business Source License 1.1: free for all non-production use, and it converts to Apache 2.0 four years from each release.
Images are versioned with SemVer, SHA256-verified, and distributed via our CDN at https://mpsandbox.horizenlabs.io. Weekly automated rebuilds pick up OS security patches without manual intervention.
# Install
git clone https://github.com/HorizenLabs/multipass-sandbox.git && cd mpsandbox && ./install.sh
# Spin up a sandbox from your project directory
cd ~/your-project
mps up
# Open a shell
mps shell
# Connect VS Code
mps ssh-config --append
# Then: Cmd/Ctrl+Shift+P -> "Remote-SSH: Connect to Host"
The repo is public. If something’s missing or broken, open an issue; we’d rather hear it directly.
AI-Native VM Builder for Developers

Multipass Sandbox isolates autonomous AI coding agents in a full VM. Production keys stay outside the blast radius. VS Code, ports, and package managers work.
Try It NowBLOG

Most quantum migration plans address one threat. The correct answer has two, and the gap between them is where most organizations quietly fail.

The Senate Banking Committee advanced the Digital Asset Market Clarity Act to the full Senate floor on May 14, 2026. The bill defines what compliance looks like for digital asset intermediaries. What it doesn't define is how the industry operationalizes those requirements, and that gap is the harder problem.

This spring, four converging signals: the Coinbase advisory board's quantum security paper, Google's accelerated 2029 PQC deadline, Oratomic's qubit estimate findings, and Scott Aaronson's public statement, collectively make the case that the industry's 2035 migration planning assumptions are no longer defensible. Horizen Labs breaks down what the evidence actually says, what is exposed on-chain today, and what serious preparation looks like.