Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. Command-Line Apps
  3. coi

coi

MITPythonv0.8.1

A security-hardened container runtime for AI coding agents using Incus system containers with real-time threat detection and credential isolation.

GitHubGitHub
513 stars36 forks0 contributors

What is coi?

Code on Incus is a security-hardened container runtime that allows developers to run AI coding assistants like Claude Code and opencode in isolated Incus system containers. It solves the security risks of running AI tools directly on a host by providing credential isolation, real-time threat detection, and network security while maintaining full functionality for the AI agents.

Target Audience

Developers and security-conscious teams who use AI coding assistants and need to protect their host systems from potential threats like credential exposure, reverse shells, and data exfiltration.

Value Proposition

Developers choose Code on Incus because it offers superior security compared to Docker or bare-metal execution, with built-in real-time threat detection, automated response mechanisms, and true credential isolation—all while providing a seamless experience for AI-assisted coding.

Overview

Give each AI agent its own isolated machine with root, Docker, and systemd. Active defense detects and stops threats automatically..

Use Cases

Best For

  • Running AI coding assistants in isolated environments with full security controls
  • Teams requiring compliance and audit logging for AI tool usage
  • Preventing credential exposure when using AI tools with Git and SSH
  • Containing potential malware or malicious code executed by AI agents
  • Parallel AI coding sessions on the same project with complete isolation
  • Security research and testing of AI coding agent behaviors in a safe sandbox

Not Ideal For

  • Casual users who run AI tools infrequently and prioritize zero-configuration simplicity over security
  • Teams operating exclusively on Windows without WSL2 or macOS unwilling to set up Colima/Lima VMs
  • Organizations deeply integrated with Docker workflows and resistant to adopting Incus

Pros & Cons

Pros

Credential Isolation by Default

SSH keys, environment variables, and Git credentials are never exposed to AI tools unless explicitly mounted, preventing accidental leaks as highlighted in the README's security features.

Real-Time Threat Detection

Kernel-level monitoring with nftables detects reverse shells and data exfiltration, automatically pausing or killing containers—no manual intervention needed, per the security monitoring section.

Seamless Session Persistence

Supports resuming AI conversations with full history and credentials restored, and offers workspace-scoped session management for continuous workflow.

Host Integration Without Risk

Features like SSH agent forwarding and automatic UID mapping allow secure access to host resources while maintaining isolation, eliminating permission issues.

Cons

Incus Dependency and Setup Complexity

Requires Incus installation and user permissions (incus-admin group), adding initial overhead compared to simpler tools like Docker, as noted in the installation guide.

Limited AI Tool Ecosystem

Currently only natively supports Claude Code and opencode, with popular tools like Aider and Cursor listed as 'coming soon', limiting immediate adoption.

Non-Linux Platform Hurdles

On macOS, it requires Colima or Lima VMs for Incus support, and Windows is limited to WSL2, adding complexity for cross-platform teams.

Open Source Alternative To

coi is an open-source alternative to the following products:

Docker Sandboxes
Docker Sandboxes

Docker Sandboxes are isolated environments created with Docker containers for testing, development, or experimentation without affecting the host system.

Frequently Asked Questions

Quick Stats

Stars513
Forks36
Contributors0
Open Issues17
Last commit3 days ago
CreatedSince 2026

Tags

#supply-chain-security#container-security#ai-coding-agents#developer-tools#claude-code#anthropic#ai-tools#devsecops#claude#network-security#lxc#cli#coding-assistant#isolation#containers#system-containers#threat-detection

Built With

G
Go
u
ubuntu
D
Docker
s
systemd

Included in

Command-Line Apps19.2k
Auto-fetched 1 day ago

Related Projects

InkOSInkOS

Autonomous novel writing AI Agent — agents write, audit, and revise novels with human review gates

Stars6,153
Forks1,166
Last commit1 day ago
agent-deckagent-deck

Terminal session manager for AI coding agents. One TUI for Claude, Gemini, OpenCode, Codex, and more.

Stars2,428
Forks280
Last commit1 day ago
agent-of-empiresagent-of-empires

Manage multiple Claude Code, OpenCode agents from either TUI or Web for easy access on mobile. Also supports Mistral Vibe, Codex CLI, Gemini CLI, Pi.dev, Copilot CLI, Factory Droid Coding. Uses tmux and git worktrees.

Stars2,267
Forks194
Last commit1 day ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub