Blog/security

Articles tagged #security

8 articles

SecuritySupply Chain Attacksnpm

How nono Prevents Supply Chain Attacks: A Case Study of the axios Compromise

How nono's kernel-level sandbox stops supply chain attacks like the axios npm compromise — blocking RAT deployment, credential theft, and exfiltration.

Mar 31, 20268 min read
SecurityWindowsWSL2

nono Now Runs on Windows: Kernel-Enforced Sandboxing via WSL2

nono v0.26.0 brings kernel-enforced sandboxing to Windows via WSL2. Landlock isolation, network filtering, credential injection, and undo — all working on Windows.

Mar 30, 20266 min read
SecuritySupply Chain AttacksPyPI

How nono Prevents Supply Chain Attacks: A Case Study of the LiteLLM PyPI Compromise

How nono's kernel-level sandbox stops supply chain attacks like the LiteLLM PyPI compromise — blocking credential theft and exfiltration at the OS level.

Mar 25, 20265 min read
securityAI AgentsGitHub

Wrapping a Simple GitHub Bot with nono: Kernel-Enforced Security for LLM Agents

How to wrap an LLM-powered GitHub bot with nono's kernel-enforced sandbox — filesystem isolation, network allowlists, credential injection, and trust verification.

Mar 24, 202613 min read
nonoopenshellsandboxing

Nono vs OpenShell: A Technical Comparison of AI Agent Sandboxes

A deep dive into the architectural differences between Nono and NVIDIA's OpenShell, two leading sandboxing solutions for untrusted AI agents.

Mar 20, 202616 min read
SecurityAI AgentsSandboxing

How to Build nono Sandbox Profiles for AI Agents

Learn how to use nono learn, policy, and profile commands to build production-ready sandbox profiles for AI agents like Claude Code.

Mar 17, 202610 min read
securitycredentialsproxy

Credential Protection for AI Agents: The Phantom Token Pattern

How nono uses a credential injection proxy to protect API keys for AI agents.

Mar 2, 202614 min read
SecurityAI AgentsSandboxing

How to sandbox Claude Code with nono

Learn how to sandbox Claude Code with nono's kernel-level isolation. Enforce default-deny filesystem access with Landlock and Seatbelt in 30 seconds.

Feb 17, 20264 min read