Isolation
Each sandbox is fully isolated from others and the host system:- Separate filesystem: Each sandbox has its own isolated filesystem
- Separate network namespace: Each sandbox has its own network stack
- Separate process tree: Processes cannot access other sandboxes
- Resource limits: CPU, memory, and disk limits are enforced
Complete isolation ensures that code running in one sandbox cannot access or interfere with other sandboxes or the host system.
Security Model
Filesystem Isolation
Each sandbox has its own filesystem that is completely separate:- Python
- JavaScript/TypeScript
Network Isolation
Each sandbox has its own network namespace:- Separate IP addresses: Each sandbox has its own IP
- No inter-sandbox communication: Sandboxes cannot directly communicate
- Controlled outbound access: Outbound requests are monitored and logged
- Secure inbound access: Inbound access requires authentication
Process Isolation
Processes in one sandbox cannot access processes in another:- Separate process IDs: Each sandbox has its own process namespace
- Resource limits: CPU and memory limits prevent resource exhaustion
- No host access: Processes cannot access the host system
Secrets Management
Never hardcode secrets in your code. Always use environment variables:- Python
- JavaScript/TypeScript
Best Practices
✅ DO: Use Environment Variables
✅ DO: Use Environment Variables
Always pass secrets via environment variables:
- Python
- JavaScript/TypeScript
✅ DO: Use Secrets Managers
✅ DO: Use Secrets Managers
For production, use secrets managers (AWS Secrets Manager, HashiCorp Vault, etc.):
- Python
- JavaScript/TypeScript
❌ DON'T: Hardcode Secrets
❌ DON'T: Hardcode Secrets
Never hardcode secrets in your code:
- Python
- JavaScript/TypeScript
Automatic Cleanup
Sandboxes automatically delete after:- Inactivity timeout: 1 hour of inactivity (configurable)
- Max lifetime: 24 hours maximum (configurable)
- Manual deletion:
sandbox.kill()
- Python
- JavaScript/TypeScript
Automatic cleanup ensures that sandboxes don’t accumulate and consume resources unnecessarily. Always clean up sandboxes when done to minimize costs.
Encryption
All data is encrypted:- Encrypted at rest: All filesystem data is encrypted
- Encrypted in transit: All network traffic uses TLS/SSL
- Secure storage: Secrets are stored securely
Compliance
Hopx follows industry security standards:- SOC 2 Type II: Enterprise compliance certified
- Data encryption: All data encrypted at rest and in transit
- Access controls: API key authentication and authorization
- Audit logging: All operations are logged for security auditing
Security Best Practices
✅ DO: Rotate API Keys Regularly
✅ DO: Rotate API Keys Regularly
Rotate your API keys every 90 days or when team members leave.
✅ DO: Use Different Keys Per Environment
✅ DO: Use Different Keys Per Environment
Use separate API keys for development, staging, and production.
✅ DO: Monitor API Key Usage
✅ DO: Monitor API Key Usage
Set up alerts for unusual activity in the dashboard.
❌ DON'T: Share API Keys
❌ DON'T: Share API Keys
❌ DON'T: Log Secrets
❌ DON'T: Log Secrets
Never log API keys or secrets in plain text. Always redact sensitive information.

