Secure sandbox execution for AI-generated code, untrusted scripts, and JS/TS services.
Ignite runs JavaScript/TypeScript code inside isolated Docker containers with optional hardened audit mode. It is designed for systems that execute code you do not fully trust:
- AI agent generated code
- plugin or extension ecosystems
- user submissions and sandboxed automation
- security-sensitive CI checks
- Container isolation with resource limits (
memoryMb,cpuLimit,timeoutMs) - Preflight checks before execution (memory, dependency load, timeout, image size)
- Security audit mode (
--audit) with network blocking and read-only root filesystem - Runtime registry with versioned runtime selection (
bun@1.3,node@20,deno@2.0,quickjs@latest) - CLI and HTTP server interfaces
curl -fsSL https://raw.githubusercontent.com/dev-dami/ignite/master/install.sh | bash
ignite --versionignite init hello-world
cd hello-worldignite run .ignite run . --audit| Command | Purpose |
|---|---|
ignite init <name> |
Generate a new service scaffold |
ignite run <path> |
Build + execute service in Docker |
ignite preflight <path> |
Run safety checks only |
ignite report <path> |
Generate preflight report |
ignite lock <path> |
Create/update ignite.lock manifest |
ignite env [path] |
Show environment/runtime information |
ignite serve |
Start HTTP API server |
| Runtime | Supported versions | Default |
|---|---|---|
| Bun | 1.0, 1.1, 1.2, 1.3 |
1.3 |
| Node | 18, 20, 22 |
20 |
| Deno | 1.40, 1.41, 1.42, 2.0 |
2.0 |
| QuickJS | 2024-01-13, 2023-12-09, latest |
latest |
Ignite accepts version-qualified runtime values and validates compatibility. Examples: bun@1.3, node@20.12.0.
- Getting Started
- Walkthrough
- API Reference
- Architecture
- Preflight Checks
- Threat Model
- Research Notes
- Interactive Docs Website
git clone https://github.com/dev-dami/ignite.git
cd ignite
bun install
bun run buildTo build release binaries and checksums:
bun run scripts/build-binaries.tsArtifacts are written to dist/:
ignite-<platform>.tar.gzSHA256SUMS
cd dist
sha256sum -c SHA256SUMS--audit is the recommended mode for untrusted code. In this mode Ignite applies restrictive Docker flags and emits a security audit report. See Threat Model for boundaries, assumptions, and non-goals.
See CONTRIBUTING.md for setup, test workflow, and release process.
MIT (see LICENSE).
