Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Sandbox

An isolated environment that restricts the actions and resources available to a running process, limiting the impact of exploitation.

A sandbox is a controlled, isolated environment that restricts what a process or application can do. By limiting access to system resources, files, network connections, and other processes, sandboxing ensures that even if a component is compromised, the attacker's ability to affect the broader system is severely constrained. Sandboxing is a core implementation of the principle of least privilege applied at the process level.

How It Works

Sandboxing works by enforcing a boundary around a process that restricts its capabilities. Operating system sandboxes use features like namespaces, seccomp filters, and mandatory access control policies to limit system calls, file access, and network communication. A sandboxed process might be allowed to read specific files and communicate over a specific network port but nothing else, regardless of the user privileges under which it runs.

Browser sandboxes are one of the most widely used implementations. Each browser tab typically runs in a separate sandboxed process with limited access to the operating system. If an attacker exploits a vulnerability in the rendering engine, the sandbox prevents the exploit from accessing files, running system commands, or interfering with other tabs. Escaping the sandbox requires a second, separate vulnerability in the sandbox implementation itself, significantly raising the barrier for successful exploitation.

Application-level sandboxes restrict the execution of user-provided content. Iframe sandboxing attributes in HTML limit what embedded content can do, preventing it from running scripts, submitting forms, or accessing the parent page's DOM unless explicitly permitted. Container-based sandboxes isolate entire application stacks, giving each service its own filesystem, process space, and network interface while sharing the host kernel.

Why It Matters

Sandboxing transforms the security model from preventing all exploits, which is impossible, to containing their impact. A vulnerability in a sandboxed component becomes significantly less dangerous because the attacker cannot escalate beyond the sandbox's boundaries without an additional vulnerability. Security assessments evaluate sandbox configurations to ensure they are properly restrictive and test for sandbox escape paths that could allow an attacker to break out of the isolated environment.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment