safepyrun is an allowlist-based Python sandbox that lets LLMs execute code safely(ish) in your real environment. Instead of isolating code in a container (which cuts it off from the libraries, data, and tools it actually needs) safepyrun runs in-process with controlled access to a curated subset of Python’s stdlib, plus any functions you explicitly opt in.
It’s the Python counterpart to safecmd, which does much the same thing for bash.
Install from pypi
$ pip install safepyrunWhen an LLM needs to run code on your behalf, the standard advice is to sandbox it in a container. The problem is that the whole reason you want the LLM running code is so it can interact with your environment – your files, your libraries, your running processes, your data. A containerised sandbox either can’t access any of that, or it requires complex volume mounts and dependency mirroring that recreate your environment inside the container.
You could just exec the LLM’s code directly in your process, which
would give full access to everything… but “everything” includes
shutil.rmtree,
os.remove,
subprocess.run("rm -rf /"), etc!
safepyrun takes a middle path. It runs the LLM’s code in your real Python process, with access to your real objects, but interposes an allowlist that controls which callables are accessible. The curated default list covers a large and useful subset of the standard library (string manipulation, math, JSON parsing, path inspection, data structures, and so on) while excluding anything that writes to the filesystem, spawns processes, or modifies system state. You can extend the list for your own functions.
The mechanism behind safepyrun is
RestrictedPython, a
long-standing project that compiles Python source code into a modified
AST (Abstract Syntax Tree) where every attribute access, item access,
and iteration is routed through hook functions. This means that when the
LLM’s code does obj.method(), it doesn’t go directly to method – it
goes through a gatekeeper that checks whether that callable is on the
allowlist. The same applies to getattr, getitem, and iter, so
there’s no easy way to accidentally reach a dangerous function through
indirect access. safepyrun supplies these hook functions, wiring them up
to an allowlist of permitted callables.
Because a lot of modern Python code (and many LLM tool-calling
frameworks) is async, safepyrun also depends on
restrictedpython-async,
which extends RestrictedPython to handle await, async for, and
async with expressions.
A lot of the online discussion around RestrictedPython suggests it’s not really useful for sandboxing, and that’s true if you’re trying to block a determined adversary. But an LLM is not a determined adversary. It’s a well-meaning but occasionally clumsy collaborator. The threat model is completely different: you don’t need to prevent deliberate escape attempts, you need to make it very unlikely that a hallucinated cleanup step or a misunderstood request causes damage. This is the same “safe-ish” philosophy used in safecmd for bash.
Once you internalise this, the design space opens up. It’s actually fine
for the LLM to read files, access the internet via httpx, parse data,
and call into your libraries. The things you want to prevent are writes
to the filesystem, spawning processes, and overwriting important state.
RestrictedPython gives us the mechanism to enforce this: it rewrites the
AST to intercept attribute access, iteration, and item access, so that
every callable goes through an allowlist check.
The allowlist has three tiers. First, a curated subset of the standard
library that has been audited once so every user doesn’t have to repeat
the work: things like re, json, itertools, math, collections,
pathlib (read-only methods), and many more. Second, user-extended
functions registered via
allow(), so
you can opt in your own project’s functions and methods. Third, an LLM
self-service mechanism: any symbol the LLM creates with a trailing
underscore (like helper_) is automatically available in subsequent
calls, letting it build up reusable utilities across a multi-step tool
loop.
from safepyrun import *The main entry point is pyrun = RunPython(), which returns an async
function that takes a string of Python code and executes it in the
sandbox. The last expression in the code is returned as the result, and
any print() output is captured separately. Errors are caught and
reported rather than crashing the caller.
pyrun = RunPython()await pyrun('1+1'){'result': 2}
You can mix print() output with a return value. The printed output
goes to the stdout key, and the last expression becomes result:
await pyrun('print("hello"); 1+1'){'stdout': 'hello\n', 'result': 2}
Modules can be imported. stderr is also captured:
await pyrun('''
import warnings
warnings.warn('a warning')
"ok"
'''){'stderr': '<tool>:2: UserWarning: a warning\n', 'result': 'ok'}
A large subset of the standard library is available out of the box –
things like re, json, math, itertools, collections, pathlib
(read-only methods), and many more. These have been audited once so that
every user doesn’t have to repeat the work:
await pyrun('import re; re.findall(r"\\d+", "there are 3 cats and 10 dogs")'){'result': ['3', '10']}
The default allowlist covers text and data processing (re, json,
csv, html, textwrap, string, difflib, unicodedata), math and
numerics (math, cmath, statistics, decimal, fractions,
random, operator), data structures (collections, heapq,
bisect, plus methods on all the built-in types), iteration and
functional tools (itertools, functools), read-only filesystem access
(pathlib,
os.path,
fnmatch), date and time (datetime, time), URL handling and
read-only HTTP
(urllib.parse,
httpx.get, ipaddress), encoding and serialization (base64,
binascii, hashlib, zlib, pickle, struct), introspection
(inspect, ast, keyword,
sys.getsizeof),
XML parsing
(xml.etree.ElementTree),
and various utilities (contextlib, copy, dataclasses, enum,
secrets, uuid, pprint, shlex, colorsys, traceback).
The allow() function
Functions you define yourself or import from third-party packages are not automatically available. If the sandbox encounters an unregistered callable, it raises an error.
To make a function available, register it with
allow():
def greet(name): return f"Hello, {name}!"allow('greet')
await pyrun('greet("World")'){'result': 'Hello, World!'}
The same applies to anything you import from PyPI. For instance, if you
wanted the LLM to be able to call
numpy.array,
you would register it with allow('numpy.array').
allow()
accepts two forms: strings and dicts. The simplest form is a bare
string, which registers a single name. This works for standalone
functions in the caller’s namespace:
def double(x): return x * 2
allow('double')
await pyrun('double(21)'){'result': 42}
For methods on modules or classes, use dotted string syntax. The string
should match how the sandbox will look up the callable, which is
ClassName.method or module.function:
import numpy as npallow('numpy.array', 'numpy.ndarray.sum')
await pyrun('np.array([1,2,3]).sum()'){'result': 6}
Note that the string must use the actual class or module name as it
appears in Python, not the alias. In the example above, even though the
sandbox code uses np, the allowlist entry is 'numpy.array' because
numpy is the module’s real name.
The dict form is a convenient shorthand for registering multiple methods on the same module or class at once. The key is the actual module or class object, and the value is a list of method name strings:
allow({np.ndarray: ['mean', 'reshape', 'tolist']})
await pyrun('np.array([1,2,3,4]).reshape(2,2).mean()'){'result': 2.5}
The dict form does two things: it registers the class/module name itself
(so it can be called as a constructor or accessed as a namespace), and
it registers each ClassName.method pair. You can mix strings and dicts
in a single
allow()
call:
allow('my_func', {np.linalg: ['norm', 'det']})There’s a third way callables become available in the sandbox: any
symbol the LLM creates whose name ends with _ (but doesn’t start with
_) is automatically exported back to the caller’s namespace, and is
available in subsequent pyrun calls. This means the LLM can build up
reusable helper functions across a multi-step tool loop without
requiring the user to register anything:
await pyrun('def clean_(s): return s.strip().lower()')await pyrun('clean_(" Hello World ")'){'result': 'hello world'}
The exported symbols are real objects in your namespace, not just available inside the sandbox. This works for variables too, not just functions:
await pyrun('result_ = [x**2 for x in range(5)]')
result_[0, 1, 4, 9, 16]
This is particularly useful in LLM tool loops where the model might need to define a parsing function in one step and reuse it in several subsequent steps. Non-suffixed names remain local to the sandbox call and are not exported.
The sandbox is async-native. If the code being executed contains
await, async for, or async with expressions, they work as
expected. Many modern Python libraries and LLM tool-calling frameworks
are async, and you want the sandbox to be able to call into them without
workarounds.
await pyrun('''
import asyncio
async def fetch(n): return n * 10
await asyncio.gather(fetch(1), fetch(2), fetch(3))
'''){'result': [10, 20, 30]}
By default,
RunPython
blocks all filesystem writes. To enable controlled writing, pass
ok_dests — a list of directory prefixes where writes are permitted.
Writing to an allowed destination works normally, but writing anywhere
else raises PermissionError:
pyrun2 = RunPython(ok_dests=['/tmp'])from pathlib import Pathawait pyrun2("Path('/tmp/test_write.txt').write_text('hello')"){'result': 5}
try: await pyrun2("Path('/etc/evil.txt').write_text('bad')")
except PermissionError as e: print(f'Blocked: {e}')Blocked: Write to '/etc/evil.txt' not allowed; permitted: ['/tmp']
The same permission checking applies to open() in write mode, not just
Path methods:
await pyrun2("open('/tmp/test_open.txt', 'w').write('hi')"){'result': 2}
try: await pyrun2("open('/root/bad.txt', 'w')")
except PermissionError as e: print(f'Blocked: {e}')Blocked: Write to '/root/bad.txt' not allowed; permitted: ['/tmp']
Read access is unaffected — only writes are gated:
await pyrun2("open('/etc/passwd', 'r').read(10)"){'result': '##\n# User '}
Higher-level file operations like
shutil.copy
are also intercepted. The destination is checked against ok_dests:
await pyrun2("import shutil; shutil.copy('/tmp/test_write.txt', '/tmp/test_copy.txt')"){'result': '/tmp/test_copy.txt'}
try: await pyrun2("import shutil; shutil.copy('/tmp/test_write.txt', '/root/bad.txt')")
except PermissionError as e: print(f'Blocked: {e}')Blocked: Write to '/root/bad.txt' not allowed; permitted: ['/tmp']
Without ok_dests, the default
RunPython
instance blocks all write operations entirely — Path.write_text isn’t
even callable:
try: await pyrun("Path('/tmp/test.txt').write_text('nope')")
except AttributeError as e: print(f'No ok_dests: {e}')No ok_dests: Cannot access callable: write_text
You can use '.' to allow writes relative to the current working
directory. Path traversal attempts (../, subdir/../../) are detected
and blocked, so the sandbox can’t escape the permitted directory:
pyrun_cwd = RunPython(ok_dests=['.'])
# Writing to cwd should work
await pyrun_cwd("Path('test_cwd_ok.txt').write_text('hello')"){'result': 5}
Path('test_cwd_ok.txt').unlink(missing_ok=True)Writing to /tmp is blocked here since it’s not in ok_dests:
try: await pyrun_cwd("Path('/tmp/nope.txt').write_text('bad')")
except PermissionError: print("Blocked /tmp as expected")Blocked /tmp as expected
Parent traversal is blocked if it resolves to a location outside ok_dests:
try: await pyrun_cwd("Path('../escape.txt').write_text('bad')")
except PermissionError: print("Blocked ../ as expected")Blocked ../ as expected
When ok_dests is set, safepyrun uses write policies to determine how
to validate each callable’s destination arguments. Three built-in policy
classes cover common patterns: checking a positional or keyword argument
(PosWritePolicy),
checking the Path object itself
(PathWritePolicy),
and checking open() calls only when the mode is writable
(OpenWritePolicy).
You can also subclass
WritePolicy
to create custom checks.
The simplest,
PosWritePolicy,
checks a specific positional or keyword argument against the allowed
destinations. Here, position 1 (or keyword dst) is validated — writing
to /tmp is allowed, but /root is blocked:
pp = PosWritePolicy(1, 'dst')
pp.check(None, ['src', '/tmp/ok'], {}, ['/tmp'])
try: pp.check(None, ['src', '/root/bad'], {}, ['/tmp'])
except PermissionError: print("PosWritePolicy correctly blocked /root/bad")PosWritePolicy correctly blocked /root/bad
You can create custom write policies by subclassing
WritePolicy
and implementing the check method. For example, here we show a policy
that only allows writes to files with specific extensions — useful if
you want the LLM to create .csv or .json files but not arbitrary
scripts.
The check signature receives (obj, args, kwargs, ok_dests) where
obj is the object the method is called on (e.g. a Path instance),
args/kwargs are the method’s arguments, and ok_dests is the list
of permitted directory prefixes. Calling
chk_dest
first handles the directory check, then the custom logic adds the
extension constraint on top.
class ExtWritePolicy(WritePolicy):
"Only allow writes to paths with specified extensions"
def __init__(self, exts): self.exts = set(exts)
def check(self, obj, args, kwargs, ok_dests):
chk_dest(obj, ok_dests)
if Path(str(obj)).suffix not in self.exts: raise PermissionError(f"{Path(str(obj)).suffix!r} not allowed")ep = ExtWritePolicy(['.csv', '.json'])
ep.check(Path('/tmp/data.csv'), [], {}, ['/tmp'])
try: ep.check(Path('/tmp/script.sh'), [], {}, ['/tmp'])
except PermissionError: print("ExtWritePolicy correctly blocked .sh")ExtWritePolicy correctly blocked .sh
You can register it with
allow_write
just like the built-in policies. The key is the ClassName.method
string the sandbox will intercept:
allow_write({'Path.write_text': ExtWritePolicy(['.csv', '.json', '.txt'])})safepyrun loads an optional user config from
{xdg_config_home}/safepyrun/config.py at import time, after all
defaults are registered. This lets you permanently extend the sandbox
allowlists without modifying the package. The config file is executed
with all safepyrun.core globals already available, so no imports are
needed. This includes
allow,
allow_write,
WritePolicy,
PathWritePolicy,
PosWritePolicy,
OpenWritePolicy,
and all standard library modules already imported by the module.
Example ~/.config/safepyrun/config.py (Linux) or
~/Library/Application Support/safepyrun/config.py (macOS):
import pandas
# Add pandas tools
allow({pandas.DataFrame: ['head', 'describe', 'info', 'shape']})
# Allow pandas to write CSV to ~/data
allow_write({'DataFrame.to_csv': PosWritePolicy(0, 'path_or_buf')})If the config file has errors, a warning is emitted and the defaults remain intact.