One Cloud Hypervisor microVM per sandbox. Stock kernel, KVM-backed, no containers. 14 ms warm-start, 4 ms exec roundtrip. Drop-in for the E2B and Daytona SDKs.
verify/perf-quick.shAF_VSOCK only. A compromised sandbox
can't reach its neighbour's /exec — no TCP, no shared L2.
templateID body
shape, expose /pause, /resume,
/files/watch, etc.
llms.txt, OpenAPI 3.1, agent skill (npx skills add).
Drops into Claude Code, Cursor, Windsurf in one line.
| Path | What's happening | P50 | P95 |
|---|---|---|---|
| Warm allocation | Pool claim — Postgres row flip, no spawn | 14 ms | 24 ms |
| Cold spawn | Reflink rootfs · TAP · CH boot · vsock RPC up | 98 ms | 313 ms |
| First exec (warm) | create → exec returning exit 0 | 22 ms | 39 ms |
| /exec roundtrip | Framed-JSON RPC over vsock | 4 ms | 5 ms |
| Resume paused | Memory + disk restore | 104 ms | 104 ms |
| Fork | Snapshot + clone in one call | 66 ms | — |
| Sequential throughput | 100× create+delete, pool refills | 26.3 /s | — |
┌───────────────────────────── CP box ───────────────────────────────┐ │ Caddy :443 ──TLS──▶ Bun control plane :3000 │ │ ├─ scheduler · warm pool · reconciler │ │ ├─ billing · audit · webhooks │ │ └─ Postgres │ └──────────────────────┬─────────────────────────────────────────────┘ │ HTTPS · mTLS · bearer · nft IP-allowlist ┌──────────────────────▼───────────────────────── sandbox host(s) ───┐ │ edge-proxy :80 <port>-<sbx>.<host>.nip.io → guest port (HMAC) │ │ │ │ host-agent (Go, root) │ │ ├─ spawns cloud-hypervisor per sandbox │ │ ├─ TAP/IP allocator on dnah-br0 (10.42.0.0/16) │ │ ├─ archive/backup to S3-compatible storage │ │ └─ vsock-rpc proxy :18048 (TLS + mTLS + bearer) │ │ │ │ cloud-hypervisor → AF_VSOCK :18047 → invm-agent (PID 1) │ │ exec · PTY · files · snap │ └────────────────────────────────────────────────────────────────────┘