When you run Claude Code under
nono, prefer using nono as the only sandbox layer. Leave Claude Code’s built-in sandbox disabled so all filesystem and network boundaries come from the kernel-enforced nono policy.If you keep Claude Code’s sandbox enabled, Anthropic documents an intentional escape hatch: when a command fails because of sandbox restrictions, Claude may retry it with dangerouslyDisableSandbox after going through Claude Code’s normal permissions flow. To disable that fallback, set "allowUnsandboxedCommands": false in Claude Code’s sandbox settings. See Anthropic’s sandboxing docs.Why Sandbox Claude Code?
Claude Code includes its own sandboxing, but Anthropic documents an intentional escape hatch: when a command fails because of sandbox restrictions, Claude may retry it withdangerouslyDisableSandbox after approval. Running Claude inside nono gives you a single kernel-enforced boundary that is easier to reason about and audit.
Quick Start
- Read+write access to the current working directory
- Read+write access to
~/.claude(agent state, debug logs, project config) - Read+write access to
~/.claude.json(settings file) - Read+write access to
~/.vscode(VS Code extensions directory) - Read+write access to the OS-specific VS Code app data directory:
~/Library/Application Support/Codeon macOS,~/.config/Codeon Linux - Read access to the OS-specific Claude Code state path:
~/Library/Keychains/login.keychain-dbon macOS,~/.local/share/claudeon Linux - Network access enabled (required for Anthropic API)
- Interactive mode enabled (preserves TTY for Claude’s terminal UI)
- Automatic hook installation for sandbox-aware error handling
- OAuth2 login support via supervised URL opening (allows
claude /loginto work)
Custom Profile
If you need different permissions, create a custom profile at~/.config/nono/profiles/claude-code.json:
Custom profiles with the same name override the built-in. Remove or rename the file to revert to the built-in profile.
Security Tips
Use Secrets Management
Instead of keeping your API key in environment variable exports or shell config files, load it from the system keystore: macOS:Restrict to Specific Projects
The built-in profile grants access to the current working directory (wherever you run the command). To limit access to a specific directory regardless of where you invoke it:Read-Only Mode
For code review or exploration where Claude shouldn’t modify files:Block Network for Offline Work
If you want to prevent any outbound connections (e.g., for reviewing local code without API calls):Add Extra Domains
If Claude Code needs to reach a domain not in the built-in network profile:OAuth2 Login
Runningclaude /login inside a sandbox requires the browser to open outside the sandboxed process. On Linux (Landlock), nono can delegate approved URLs to the unsandboxed parent process. On macOS (Seatbelt), Claude’s login flow needs a temporary LaunchServices permission to open the browser.
The built-in claude-code profile includes an origin allowlist that controls which URLs may be opened during supervised login flows:
https://claude.ai(OAuth2 authorize endpoint)localhostcallbacks (for the OAuth2 redirect)
--allow-launch-services.
Adding Custom OAuth2 Origins
If your organization uses a custom identity provider for Claude Code authentication, add its origin to your profile:open_urls, it replaces the base profile’s config entirely. Include all origins you need, including https://claude.ai if you still want the standard OAuth2 flow. Omit open_urls to inherit the base profile’s settings unchanged.
The origin allowlist is enforced by the supervisor when
nono delegates browser opening itself. On macOS, --allow-launch-services bypasses that supervisor path for the duration of the session in exchange for login compatibility.Enabling LSPs, Linters, and Dev Tools
Claude Code’s LSP plugins (pyright, rust-analyzer, etc.) spawn language servers as child processes. These spawns useposix_spawnp() which searches your PATH for the binary. If any PATH directory is unreadable to the sandbox, posix_spawnp() receives EPERM from the kernel and stops searching immediately (unlike ENOENT, which continues to the next entry).
nono’s built-in system paths cover standard directories (/usr/bin, /opt, etc.), but version managers and dev tools install binaries under ~/ which requires explicit read access.
Common home-directory PATH entries that need read access:
| Tool | Path |
|---|---|
| Rust / cargo | ~/.cargo/bin |
| Go | ~/go/bin |
| Python / pyenv | ~/.pyenv/shims, ~/.pyenv/bin |
| Node / fnm | ~/.local/share/fnm, ~/.local/state/fnm_multishells |
| Node / nvm | ~/.nvm |
| Node / pnpm | ~/Library/pnpm, ~/.local/share/pnpm |
| Haskell / ghcup | ~/.ghcup/bin |
| Ruby / rbenv | ~/.rbenv/shims, ~/.rbenv/bin |
| Local binaries | ~/.local/bin |
~/ entry that appears before the directory containing your LSP binary:
You only need
--read (not --allow) for these directories. This permits PATH lookup without granting write access.VS Code Extension
Claude Code installs a VS Code extension on startup. The built-in profile already grants write access to~/.vscode plus the OS-specific VS Code data directory: ~/Library/Application Support/Code on macOS or ~/.config/Code on Linux. No additional flags are needed for VS Code extension installation.
Git Configuration
Claude Code reads git configuration for repository operations. The built-in profile includes thegit_config group, which grants read access to ~/.gitconfig, ~/.gitignore_global, and ~/.config/git/ignore. No additional flags are needed for git operations.
Secretive (SSH Keys in Secure Enclave)
If you use Secretive to store SSH keys in the macOS Secure Enclave, git commit signing (git commit -S) needs access to the Secretive agent socket. Create a custom profile that extends the built-in Claude Code profile:
Save as ~/.config/nono/profiles/claude-code-secretive.json:
- Read access to
~/.ssh/config(git signing configuration) - Read access to the Secretive agent socket (
~/Library/Containers/com.maxgoedjen.Secretive.SecretAgent/Data/socket.ssh) - Read+write access to
~/.ssh/known_hosts(SSH may append new host keys)
The Secretive socket is a Unix domain socket, not a regular file. nono supports granting capabilities on sockets directly, so only the socket itself is exposed — not the entire container directory.
Overriding Profile Settings
CLI flags always take precedence over profile settings:Automatic Hook Integration
When you first runnono run --profile claude-code, nono automatically installs a hook that helps Claude understand sandbox restrictions. You’ll see:
- Detects sandbox errors - When Claude’s file operations fail due to sandbox restrictions
- Injects context - Tells Claude exactly which paths are allowed and blocked
- Provides guidance - Instructs Claude to suggest restarting with
--allowflags instead of attempting workarounds
~/.claude/CLAUDE.md with upfront sandbox instructions, so Claude understands the security boundaries before encountering errors.
The hook installation is idempotent - it only installs once and updates automatically when nono is upgraded. The hook only activates when running inside a nono sandbox (detected via
$NONO_CAP_FILE).