NVIDIA OpenShell
Developer ToolsNVIDIA's open-source runtime for running autonomous AI agents inside sandboxed environments with policy controls, inference routing, and kernel-level isolation.
A secure workshop for AI agents: the agent can use tools and get real work done, but the doors, outlets, file cabinets, and network lines are controlled by the building, not by the agent.
NVIDIA OpenShell is an open-source runtime for executing autonomous AI agents in sandboxed environments. It is designed for the specific risk created by modern coding agents and long-running AI assistants: the model needs access to files, shells, packages, APIs, credentials, and networks to be useful, but giving an agent unrestricted access to those resources turns every prompt injection, malicious dependency, or bad tool call into a real security incident.
OpenShell sits between the agent and the infrastructure it wants to use. Instead of relying only on prompts or the agent's own self-restraint, it enforces rules outside the agent process. NVIDIA describes the runtime around three stable components: the CLI for user access, the Gateway as the control plane, and the Supervisor inside each sandbox workload as the local security boundary. The Gateway manages state, providers, policies, inference configuration, and sandbox lifecycle. The Supervisor launches the agent as a restricted child process and enforces policy where filesystem access, process identity, network egress, and credentials are visible.
What OpenShell Controls
| Component | What it does | Why it matters |
|---|---|---|
| Gateway | Manages sandbox lifecycle, providers, settings, policies, authorization, and inference configuration. | Gives teams one control plane for agent sessions instead of letting each agent decide its own access. |
| Sandbox | Runs the agent in an isolated execution environment with controlled file, process, and network access. | Limits the blast radius when an agent makes a bad decision or runs untrusted code. |
| Supervisor | Runs inside every sandbox workload and enforces local policy around process identity, filesystem, network egress, and credentials. | Moves enforcement outside the model so the agent cannot prompt its way around the rule. |
| Policies | Declarative YAML rules define what the agent can read, write, call, and reach. | Turns agent permissions into reviewable infrastructure instead of ad hoc approvals. |
| Inference routing | Routes model calls through controlled backends such as local or approved external providers. | Keeps sensitive context under policy control rather than letting the agent send data anywhere. |
OpenShell uses multiple layers of protection, including filesystem restrictions, network controls, process restrictions, and inference routing. NVIDIA's docs describe filesystem controls through Landlock, syscall restrictions through seccomp, network namespace isolation, and a privacy-enforcing proxy for outbound traffic. The important design choice is deny-by-default runtime enforcement: every session is sandboxed, every permission is verified by the runtime, and policies can be reviewed like infrastructure code.
OpenShell vs Coding Agents
OpenShell is not a coding assistant in the same sense as Codex, Claude Code, OpenCode, Cursor, or GitHub Copilot. Those tools decide what work to do and generate actions. OpenShell is the runtime layer underneath them. It provides the sandbox, policy engine, gateway, and inference routing that make those actions safer to execute.
That distinction matters. A coding agent can be excellent at solving a task and still be unsafe if it has unrestricted shell access, live credentials, broad network access, and the ability to install packages. OpenShell treats agent safety as an operating-environment problem rather than a personality trait of the model. The agent can still plan, write code, run tools, and call models, but it does so inside boundaries that the runtime enforces.
Why It Matters
As AI agents move from chat windows into terminals, CI systems, and developer workstations, the security problem shifts from "what did the model say" to "what can the model do." OpenShell is NVIDIA's answer to that shift. It gives developers and enterprises a way to run powerful autonomous agents while keeping file access, network access, credentials, model routing, and auditability under explicit control.
The short version: OpenShell is not the agent. It is the secure room the agent works inside.
References & Resources
Related Terms
Last updated: May 15, 2026