Security

ArcBox's security model and practices.

Isolation Model

Containers run inside a lightweight Linux VM, providing hardware-level isolation between your workloads and your Mac.

macOS Host VM Boundary (Virtualization.framework) Your Applications ArcBox Daemon Container A Container B Container C

Even if a container is compromised, the attacker is confined to the VM. They cannot access your Mac's filesystem, processes, or network directly.

Privileged Helper

The privileged helper runs with elevated permissions but follows strict security principles:

PrincipleDetail
Minimum privilegeOnly three operations, all validated
Path whitelistingRefuses to write to unexpected locations
Code signing verificationOnly accepts XPC connections from signed ArcBox binaries
Symlink-only writesNever writes executable code

See Helper for the full security design.

Network Isolation

Containers are isolated on a virtual network. They can reach the internet through NAT but are not directly accessible from the host network unless you explicitly expose ports.

Data Storage

All container data (images, volumes, runtime state) is stored in the VM's virtual disk at:

config.json
vm.disk
daemon.sock

No container data is written outside this directory. Uninstalling ArcBox and removing this directory eliminates all traces.

Telemetry

ArcBox collects no telemetry by default. Crash reporting via Sentry is opt-in during first launch. If opted in, only crash stack traces are sent — no container data, filesystem content, or usage patterns.

Reporting Vulnerabilities

Report security vulnerabilities to security@arcbox.dev. We follow responsible disclosure and aim to acknowledge reports within 48 hours.

On this page