Skip to content

docs(isolation): frame strategies as user-protection security boundary#511

Merged
sytone merged 1 commit into
mainfrom
docs/510-isolation-security-framing
May 22, 2026
Merged

docs(isolation): frame strategies as user-protection security boundary#511
sytone merged 1 commit into
mainfrom
docs/510-isolation-security-framing

Conversation

@sytone
Copy link
Copy Markdown
Owner

@sytone sytone commented May 22, 2026

Closes #510

What

Reframes IIsolationStrategy and the four built-in strategies (in-process, sandbox, container, remote) to lead with their security purpose: bounding what an agent can reach and what it can leak when prompt-injected, executing hostile tool output, or simply mistaken.

Isolation is the platform's primary defense against agent actions the user did not sanction; documentation should help operators choose the right strategy for their threat model rather than picking based only on speed.

Why

Existing wording described isolation as execution environment (the how), not as a user-protection boundary (the why). It also contained stale terminology — restricted AppDomain no longer applies on the .NET runtime BotNexus targets.

Changes (doc-comment / markdown only — no behaviour change)

  • IIsolationStrategy: rewrite XML summary + remarks; present strategies on a fastest → most-isolated spectrum; describe sandbox as separate process + IPC + OS-level confinement; note hardened-container runtimes (gVisor / Firecracker / Kata) as a future extension.
  • Per-strategy stubs (Sandbox / Container / Remote): each summary now leads with the user-protection framing it provides.
  • InProcessIsolationStrategy: spells out that there is no security boundary, and points at sandbox / container / remote for untrusted or sensitive workloads.
  • docs/architecture/domain-model.md: renamed Agent Execution StrategiesAgent Isolation Strategies with the security framing.
  • docs/architecture/principles.md (ADR-005): explicit security framing; lists the planned strategies as the spectrum.
  • docs/architecture/overview.md, src/gateway/README.md and src/gateway/BotNexus.Gateway[.Abstractions]/README.md: aligned table / inline descriptions with the security-boundary framing.

Verification

dotnet build BotNexus.slnx --nologo --tl:offBuild succeeded. 0 Warning(s) 0 Error(s).

No tests run — changes are XML doc-comment and markdown only; no behaviour changes.

Reframe IIsolationStrategy and the four built-in strategies (in-process,
sandbox, container, remote) to lead with their security purpose: bounding
what an agent can reach and leak when prompt-injected, executing hostile
tool output, or simply mistaken.

Changes (doc-comment / markdown only — no behaviour change):

- IIsolationStrategy: rewrite XML summary + remarks; present strategies on
  a fastest-to-most-isolated spectrum; describe sandbox as separate process
  + IPC + OS confinement (not stale "AppDomain"); note hardened-container
  runtimes (gVisor / Firecracker / Kata) as a future extension.
- Per-strategy stubs (Sandbox/Container/Remote): lead each summary with the
  user-protection framing it provides.
- InProcessIsolationStrategy: spell out that there is no security boundary
  and point at sandbox/container/remote for untrusted or sensitive workloads.
- docs/architecture/domain-model.md: rename "Agent Execution Strategies"
  section to "Agent Isolation Strategies" with the security framing.
- docs/architecture/principles.md (ADR-005): explicit security framing,
  list the planned strategies as the spectrum.
- docs/architecture/overview.md, src/gateway/README.md and
  src/gateway/BotNexus.Gateway[.Abstractions]/README.md: align table /
  inline descriptions with the security-boundary framing.

Closes #510

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@sytone sytone merged commit 4600d42 into main May 22, 2026
10 checks passed
@sytone sytone deleted the docs/510-isolation-security-framing branch May 22, 2026 18:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Docs] Frame isolation strategies as user-protection security boundary

1 participant