-
Notifications
You must be signed in to change notification settings - Fork 32
Open
Labels
area: agentClaude agent loopClaude agent loopenhancementNew feature or requestNew feature or requestpriority: highBlocks users or degrades experienceBlocks users or degrades experiencesize: largeSignificant new functionalitySignificant new functionality
Description
Context
Since Chief runs Claude Code with --dangerously-skip-permissions, users have no sandbox protection. Running agents inside Docker containers provides real filesystem and network isolation.
Problem
A user successfully containerized Chief manually, but ran into issues:
--dangerously-skip-permissionscannot be used with root/sudo privileges, so the in-container user must be configured as non-root- Claude crash logs were not exposed, making debugging the container setup difficult
- No documentation or tooling exists to help users set this up
Suggested solution
- Provide a Dockerfile or
chief init --dockercommand that sets up a containerized environment - Possibly make this a step in the PRD creation flow (similar to how PRD creation is interactive)
- Document the non-root user requirement and other container gotchas
- Consider making containerized execution the default or strongly recommended mode
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
area: agentClaude agent loopClaude agent loopenhancementNew feature or requestNew feature or requestpriority: highBlocks users or degrades experienceBlocks users or degrades experiencesize: largeSignificant new functionalitySignificant new functionality