| Name | Modified | Size | Downloads / Week |
|---|---|---|---|
| Parent folder | |||
| README.md | < 24 hours ago | 1.5 kB | |
| v2026.4.2_ Process sandboxing for exec and run source code.tar.gz | < 24 hours ago | 6.7 MB | |
| v2026.4.2_ Process sandboxing for exec and run source code.zip | < 24 hours ago | 9.6 MB | |
| Totals: 3 Items | 16.3 MB | 0 | |
Note: This release's build failed so no binary assets were published. Use v2026.4.3 instead, which includes all changes from this release plus a build fix.
This release introduces experimental process sandboxing for mise exec and mise run, allowing you to restrict filesystem access, network access, and environment variables for executed processes.
Added
- Process sandboxing for
mise xandmise run(experimental) -- A new lightweight sandboxing layer lets you lock down what processes spawned by mise can access. On Linux it uses Landlock for filesystem restrictions and seccomp-bpf for network filtering; on macOS it usessandbox-exec(Seatbelt) with generated profiles. Requiresexperimental = truein settings. #8845 by @jdx
```bash # Block all filesystem and network access mise x --deny-all -- node script.js
# Block network only mise x --deny-net -- npm run build
# Block writes except to ./dist mise x --allow-write=./dist -- npm run build ```
Task-level configuration is also supported:
toml
[tasks.build]
run = "npm run build"
deny_net = true
allow_write = ["./dist"]
Fixed
- Docs: correct
RUNTIME.osTypeandRUNTIME.archTypevalues -- Fixed inconsistent documentation for runtime template variables and simplified examples. #8785 by @esteve
Full Changelog: https://github.com/jdx/mise/compare/v2026.4.1...v2026.4.2