Skip to content

Commit 488fca1

Browse files
authored
Merge pull request #24611 from dvdksn/sbx/restrict-delegation-rules
sandboxes/policy: document blocked values for user-defined rules
2 parents d95fbc9 + d6fb96a commit 488fca1

File tree

1 file changed

+11
-0
lines changed
  • content/manuals/ai/sandboxes/security

1 file changed

+11
-0
lines changed

content/manuals/ai/sandboxes/security/policy.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,17 @@ and denies `*.corp.internal`:
6060
- `sbx policy allow network build.corp.internal` — no effect, because the
6161
organization denies `*.corp.internal`
6262

63+
#### Blocked values in user-defined rules
64+
65+
To prevent overly broad rules from undermining the organization's policy,
66+
certain catch-all values are blocked in user-defined rules:
67+
68+
- Domain patterns: `*`, `**`, `*.com`, `**.com`, `*.*`, `**.**`
69+
- CIDR ranges: `0.0.0.0/0`, `::/0`
70+
71+
Scoped wildcards like `*.example.com` are still allowed. If you attempt to
72+
use a blocked value, `sbx policy` returns an error immediately.
73+
6374
## Network policies
6475

6576
The only way traffic can leave a sandbox is through an HTTP/HTTPS proxy on

0 commit comments

Comments
 (0)