Community-contributed kits for Docker Sandboxes.
Each top-level directory is a kit — a declarative artifact containing a spec.yaml and optional files/ directory that extends sandbox agents with additional capabilities.
Note
Kits are experimental. The kit file format, CLI commands, and experience for creating, loading, and managing kits are subject to change as the feature evolves. Bugs and feature requests for the kits in this repo belong in its issue tracker; general feedback on the kit feature itself goes to docker/sbx-releases.
Kits are passed to sbx run (or sbx create) via --kit. The flag accepts a local path, an OCI registry reference, a ZIP archive, or a git+... URL.
The most common form is a git URL targeting this repo:
$ sbx run --kit "git+https://github.com/docker/sbx-kits-contrib.git#dir=code-server" claudeThe fragment after # accepts two parameters, both optional:
| Parameter | Purpose | Example |
|---|---|---|
dir |
Subdirectory inside the repo containing the kit | #dir=code-server |
ref |
Git ref to check out — branch, tag, or commit SHA | #ref=v1.0.0 |
Combine them with &:
# Pin to a tag — the recommended form for production use
$ sbx run --kit "git+https://github.com/docker/sbx-kits-contrib.git#ref=v0.2.0&dir=code-server" claude
# Track a branch (less stable; the kit may change under you)
$ sbx run --kit "git+https://github.com/docker/sbx-kits-contrib.git#ref=main&dir=code-server" claude
# Pin to an exact commit SHA — fully reproducible
$ sbx run --kit "git+https://github.com/docker/sbx-kits-contrib.git#ref=abc1234&dir=code-server" claudeWithout ref, sbx clones the default branch shallowly. With a branch or tag, sbx clones at that ref shallowly. With a commit SHA, sbx clones fully and checks out the commit.
You can also use SSH instead of HTTPS for private repos:
$ sbx run --kit "git+ssh://git@github.com/docker/sbx-kits-contrib.git#dir=code-server" claudeFor local development, point --kit at a directory:
$ sbx run --kit ./code-server/ claudesbx-kits-contrib/
├── spec/ # Kit artifact types, loading, and validation (importable library)
├── tck/ # Technology Compatibility Kit — test suite using testcontainers-go
├── pi/ # Pi coding agent kit
├── nanobot/ # Nanobot assistant kit
├── openclaw/ # OpenClaw assistant kit
├── nanoclaw/ # NanoClaw WhatsApp bridge kit
└── .github/ # CI workflows
- Create a directory at the repo root with your kit name (lowercase, alphanumeric + hyphens):
my-kit/
├── spec.yaml
├── my_kit_tck_test.go
└── files/
└── home/ # Files copied to /home/agent/ in the container
└── config.json
- Write your
spec.yaml:
schemaVersion: "1"
kind: mixin
name: my-kit
displayName: My Kit
description: "Short description of what this kit does"
network:
allowedDomains:
- example.com
deniedDomains:
- tracker.example.com
environment:
variables:
MY_CONFIG: "/home/agent/config.json"
commands:
install:
- command: "pip install my-tool"
user: "1000"
description: Install my-tool
startup:
- command: ["my-tool", "serve"]
user: "1000"
background: true
description: Start my-tool- Write a TCK test file (
my_kit_tck_test.go):
package my_kit_test
import (
"testing"
"github.com/docker/sbx-kits-contrib/tck"
"github.com/stretchr/testify/require"
)
func TestMyKitTCK(t *testing.T) {
suite, err := tck.NewSuiteFromDir(".")
require.NoError(t, err)
suite.RunAll(t)
}- Run the TCK locally:
cd my-kit
go test -v -count=1 -timeout 10m ./...The TCK validates your kit automatically:
- Validation —
spec.yamlparses correctly with required fields - Network policy — allowed domains and service auth are well-formed
- Credential policy — credential sources are properly defined
- Commands — install/startup commands are well-formed
- Environment variables — declared env vars are set in the container
- Container files — files from
files/are injected at the correct paths - Security — tmpfs mounts (e.g.,
/run/secrets) are present
By default, mixins use the shell template image. To extend a specific agent (e.g., Claude, Gemini), add the extends field:
schemaVersion: "1"
kind: mixin
name: my-claude-extension
extends: claude
# ...The TCK resolves the parent's template image automatically for well-known agents (shell, claude, codex, copilot, cursor, docker-agent, droid, gemini, kiro, opencode). For other parents, use WithImage:
suite, err := tck.NewSuiteFromDir(".", tck.WithImage("my-custom/template:latest"))Importable library for parsing, validating, and working with kit artifacts:
import "github.com/docker/sbx-kits-contrib/spec"
artifact, err := spec.LoadFromDirectory("./my-kit")Test framework that validates kit artifacts against real containers:
import "github.com/docker/sbx-kits-contrib/tck"
suite, err := tck.NewSuiteFromDir(".")
suite.RunAll(t)Pull requests trigger TCK tests automatically:
- Kit changes: only the modified kit is tested
- TCK/spec changes: all kits are tested
- Each kit runs in a separate CI runner on Linux
- Go 1.23+
- Docker (for container-based TCK tests)