Secure infrastructure for running AI-generated code. Each sandbox boots in 200ms in its own microVM. Run code, manage files, clone repos, and stream processes.
import requests
api_key = "<your-api-key>"
sandbox = requests.post(
"https://api.leap0.dev/v1/sandbox",
headers={"Authorization": api_key},
json={
"template_name": "system/code-interpreter",
"vcpu": 2,
"memory_mib": 2048,
}
).json()
# Sandbox is live in ~200ms
print(sandbox["id"]) 200ms
Cold Start
8h
Max Execution
8
Max vCPU
8 GB
Max Memory
What is Leap0
Create a template from any container image. Spawn sandboxes from that template in 200ms. Each sandbox runs in its own Firecracker microVM with dedicated CPU, memory, and network boundaries. Invoke it over HTTP, SSE, or WebSocket. Delete it when you're done.
Why use sandboxes
Sandboxes exist for security. They let agents execute arbitrary code, access files, and use the network without compromising your credentials, local files, or host system. This isolation is essential when agents run autonomously.
Built-in Tools
Stateful REPL sessions for Python and TypeScript. Variables persist across calls. Matplotlib charts auto-captured as PNG and SVG. 50+ pre-installed data-science packages.
Full filesystem access inside every sandbox. List, upload, download, move, delete, and search files. Batch operations for multi-file uploads and tar-archive downloads.
Clone repos, create branches, stage files, commit, push, and pull. Your agent can work with any Git repository inside its sandbox without installing anything.
Execute one-shot commands inside a running sandbox.
Interactive terminal sessions over WebSocket with persistent session state, live input/output, and runtime terminal resizing.
Start language servers for Python and TypeScript to power completions, symbols, and document lifecycle events directly in the sandbox.
Generate and manage time-bound SSH credentials for direct sandbox access, with validate, rotate, and revoke endpoints.
OpenTelemetry-native observability. Stream logs, metrics, traces, and spans from running sandboxes in real-time.
Fine-grained egress control per sandbox. Allow-list specific IP ranges or block all outbound traffic entirely. Each sandbox gets its own network boundary.
Invoke any sandbox directly over HTTP, Server-Sent Events, or WebSocket. Whatever your app serves inside the sandbox is reachable at its unique subdomain.
How It Works
Choose CPU, memory, timeout, and optional network restrictions. Live in ~200ms.
POST /v1/sandbox
{
"template_name": "system/code-interpreter",
"vcpu": 2,
"memory_mib": 2048
} Execute code, manage files, clone repos, or just hit your app's HTTP endpoint directly.
POST /execute
{
"code": "print('hello')",
"language": "python"
} Firecracker with the Jailer for process and filesystem isolation. Dedicated network boundaries with egress policy enforcement. No shared state between sandboxes. Ever.
Free while Leap0 is in public preview. No credit card required.