Milliseconds, not seconds.
Each sandbox boots a complete Debian userland with systemd as PID 1.
Give your agents a full Linux machine. Boots in under 200 ms. No time limits, fully audited.
Start with $100 in free credits · No credit card required
import { Zunesha } from '@zuneshalabs/ts-sdk';const zun = new Zunesha({ apiKey: process.env.ZUNESHA_API_KEY });const sandbox = await zun.sandboxes.create({ image: 'zunesha/debian-13-claude-code/v1', cpu: 4, memory: '8Gi'});const run = await sandbox.run({ command: 'claude --task "audit pr 482"'});console.log(run.stdout);package mainimport ( "context" "fmt" "os" zunesha "github.com/zuneshalabs/go-sdk")func main() { ctx := context.Background() zun := zunesha.New(os.Getenv("ZUNESHA_API_KEY")) sb, _ := zun.Sandboxes.Create(ctx, &zunesha.CreateSandboxRequest{ Image: "zunesha/debian-13-claude-code/v1", CPU: 4, Memory: "8Gi", }) run, _ := sb.Run(ctx, "claude --task \"audit pr 482\"") fmt.Println(run.Stdout)}import osfrom zunesha import Zuneshazun = Zunesha(api_key=os.environ["ZUNESHA_API_KEY"])sandbox = zun.sandboxes.create( image="zunesha/debian-13-claude-code/v1", cpu=4, memory="8Gi",)run = sandbox.run(command='claude --task "audit pr 482"')print(run.stdout)Pick an image, a region, and a resource size. Each sandbox provisions on its own in the background. No host setup, no per-team plumbing.
Coding, ops, support, analysis: all with controlled tooling, scoped permissions, and live observability. Multiple agents can run side by side in the same workspace.
Inspect logs, approvals, artifacts, and the full execution history in one timeline. Snapshot the disk to keep evidence; branch it to retry safely.
Each sandbox boots a complete Debian userland with systemd as PID 1.
Each workspace is its own Incus project. Two workspaces on one host never observe each other.
ZFS copy-on-write. Branch the disk per attempt, restore in seconds.
Pre-baked Debian 13 images for every major agent runtime. mise, git, systemd, and language toolchains already in the image.
OCI containers were built for human dev workflows. VMs were built for hard isolation at the cost of density. Incus gives you both, and Zunesha.ai is the operator console on top.
| Capability | OCI (Docker) | VMs | Incus · Zunesha.ai |
|---|---|---|---|
| Full Linux (systemd PID 1, apt, persistent state) | Partial support | Full support | Full support |
| Cold boot in milliseconds | Full support | Not supported | Full support |
| Long-running, no execution caps | Not supported | Not supported | Full support |
| High container density / low overhead | Full support | Not supported | Full support |
| ZFS snapshots & instant clones | Not supported | Partial support | Full support |
| Hard isolation (workspace + kernel namespaces) | Not supported | Full support | Full support |
| Root access inside the sandbox | Partial support | Full support | Full support |
| Safe for LLM-generated / untrusted code | Partial support | Full support | Full support |
| Signed execution audit trail | Not supported | Not supported | Full support |
| Pre-baked agent images (Claude Code, Codex, OpenCode) | Not supported | Not supported | Full support |
| Per-second metered billing | Partial support | Partial support | Full support |
Workspaces are region-scoped at create time. Your sandboxes never leave the geography you chose. Useful for residency, latency, and the auditor's spreadsheet.
Start free
Every account starts with free vCPU + RAM credits and 5 GB of always-free storage.
Pay as you go
Compute and storage bill only when workloads are running beyond the free baseline.
Unlock more pool
Verification, top-ups, and sustained usage unlock larger shared compute pools.
Start with $100 in free credits · No credit card required during waitlist.
Shared capacity expands with verification, top-ups, and sustained spend.
Tier
Tier 1
vCPU
4 vCPU
RAM
8 GiB
Unlock requirement
Email verified
Tier
Tier 2
vCPU
20 vCPU
RAM
40 GiB
Unlock requirement
CC on file + $25 top-up
Tier
Tier 3
vCPU
100 vCPU
RAM
200 GiB
Unlock requirement
$500 top-up
Tier
Tier 4
vCPU
500 vCPU
RAM
1,000 GiB
Unlock requirement
$2,000 / 30 days
Tier
Enterprise
vCPU
Custom
RAM
Custom
Unlock requirement
Contact sales
Storage remains free up to 5 GB for every account. Above that threshold, storage is metered continuously using the listed hourly and per-second rate.
Skim the deck. If your question isn't here, the docs go deeper. Or talk to us directly.
Every account starts with $100 in compute credits shared across vCPU and RAM. Storage has a separate 5 GB permanent free allowance, and only starts billing above that threshold. Credits do not expire during the alpha.
There is no monthly platform fee. Billing starts the moment a workload consumes vCPU or RAM above the free credit balance, metered per second. Storage bills per GB-hour once you exceed the 5 GB free tier.
Capacity unlocks progressively. Tier 1 is available after email verification. Tier 2 requires a card on file plus a $25 top-up. Tier 3 unlocks at $500 committed, Tier 4 at $2,000 sustained over 30 days. Enterprise is a custom agreement; contact us.
Incus is the open-source successor to LXD: a container and VM manager that gives each sandbox a full Linux system namespace with real systemd as PID 1. Unlike Docker-based sandboxes that share a kernel namespace, Incus containers boot a complete OS image in under 200 ms while keeping filesystem, network, and process namespaces strictly isolated. For agent workloads this means no shared kernel attack surface, per-second billing tied to actual container uptime, and ZFS-backed copy-on-write snapshots that branch instantly.
Yes. Each sandbox is a full Debian 13 system with systemd as PID 1. Your agent can run apt-get, install any package, start background daemons with systemctl, open ports, and run long-lived processes, exactly as on a real Linux machine. The golden images ship with mise, git, and common runtimes pre-installed so most agents start without needing to install anything.
Each workspace maps to a dedicated Incus project: a hard namespace boundary. Sandboxes in workspace A cannot see, reach, or share filesystem state with sandboxes in workspace B, even on the same host. Network traffic between workspaces is blocked at the virtual NIC layer. This is full project-level separation backed by the host kernel, not container-group isolation.
Snapshots use ZFS copy-on-write clones, so taking one is instant regardless of disk size; only changed blocks are stored. You can snapshot a running sandbox and branch it into independent clones: run one branch to completion, discard it, and retry from the snapshot. This is useful for replaying agent decisions, A/B testing tool configurations, or keeping a clean checkpoint before a risky operation.
Yes. A workspace is a multi-sandbox namespace, not a single container. You can provision dozens of sandboxes simultaneously, each with its own vCPU, RAM, and filesystem allocation. Each sandbox provisions independently, and the audit timeline tracks every execution history separately.
By default the sandbox stops. It moves to the stopped state and billing for compute pauses. The filesystem is preserved so you can inspect artifacts, take a snapshot, or restart later. You can also mark a sandbox to delete on completion so it cleans up automatically.
Golden images ship pre-configured for Claude Code (Anthropic), Codex (OpenAI), OpenCode, and OpenClaw. Each image sets the environment variables, installs the relevant CLI/SDK, and configures sensible workspace defaults. You can also bring your own Debian-based image and install any framework manually.
Sandboxes provide strong isolation: each runs in its own Incus container with dedicated kernel namespaces, no access to the host filesystem, and no cross-workspace networking. LLM-generated code running inside a sandbox cannot escape to the host or other workspaces. For additional safety you can restrict the sandbox's network policy and audit every command via the signed execution timeline.
Access is controlled by workspace membership roles: Owner, Admin, and Member. Members can view and interact with sandboxes; Admins can create, delete, and configure them; Owners have full control including workspace deletion. All access is mediated by JWT-authenticated RPC calls. Audit logs record every action with the acting user's identity.
We're letting teams in as capacity opens up. Tell us what you're shipping and we'll reach out within 24 hours.