Skip to content

Commit d6fb96a

Browse files
dvdksnclaude
andcommitted
sandboxes/policy: document blocked values for user-defined rules
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent 8adfb60 commit d6fb96a

File tree

1 file changed

+11
-0
lines changed
  • content/manuals/ai/sandboxes/security

1 file changed

+11
-0
lines changed

content/manuals/ai/sandboxes/security/policy.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,17 @@ and denies `*.corp.internal`:
6060
- `sbx policy allow network build.corp.internal` — no effect, because the
6161
organization denies `*.corp.internal`
6262

63+
#### Blocked values in user-defined rules
64+
65+
To prevent overly broad rules from undermining the organization's policy,
66+
certain catch-all values are blocked in user-defined rules:
67+
68+
- Domain patterns: `*`, `**`, `*.com`, `**.com`, `*.*`, `**.**`
69+
- CIDR ranges: `0.0.0.0/0`, `::/0`
70+
71+
Scoped wildcards like `*.example.com` are still allowed. If you attempt to
72+
use a blocked value, `sbx policy` returns an error immediately.
73+
6374
## Network policies
6475

6576
The only way traffic can leave a sandbox is through an HTTP/HTTPS proxy on

0 commit comments

Comments
 (0)