Docs
Start with the architecture and runtime model, then move to examples and guides.
Quickstart
terminal
$
cargo install void-box$
void-box run examples/hackernews/hackernews_agent.yamlReference
ArchitectureHost/guest execution model, KVM isolation boundary, and security layers.
Runtime ModelClaude Code as the canonical runtime, provider backend selection, and Ollama compatibility.
CLI + TUICommand surface (
run, validate, status, logs) and TUI interaction model.
Events + ObservabilityStructured run events, session persistence, and traceability.
OCI ContainersGuest images, base images, and OCI skill mounts for composing language runtimes.
SnapshotsSub-second VM restore via snapshot/restore with COW mmap — base and diff snapshot types.
Host MountsShare host directories into guest VMs via 9p/virtiofs with read-only or read-write mode.
Security ModelDefense in depth: KVM isolation, seccomp-BPF, session authentication, guest hardening, SLIRP controls.
Wire ProtocolAF_VSOCK framing, message types, session authentication, and network layout.
Next
See the Guides for practical walkthroughs: pipeline composition, YAML specs, local LLMs, and agent sandboxing.
