When AI agents run untrusted code, access APIs with real credentials, and invoke tools autonomously, security cannot be an afterthought. Runloop provides defense-in-depth at the infrastructure layer: credential protection against prompt injection, tool-level access control, hardware-isolated compute, and full audit trails for every action your agents take.


Run structured benchmarks and compare models before deploying to production.
Credential theft through prompt injection is already happening in production. Prompt-injected PR comments have caused GitHub Copilot to exfiltrate AWS keys from private repositories via encoded image requests. Link Trap attacks coerce models into packaging credentials into attacker-controlled URLs. In every case, the root cause is the same: real credentials exist in the agent's environment, and a single successful prompt injection extracts them.
Runloop Credential Gateway eliminates this attack surface entirely. Real credentials never exist on the Devbox. The gateway issues an opaque token that is bound to a specific Devbox, expires when that Devbox terminates, and only works through Runloop's proxy infrastructure. The agent uses the token exactly like a normal API key -- two fields change (base URL and key source) and every SDK call works as before. The gateway injects the real credential server-side and proxies to the upstream API with typically less than 10ms of added latency.
No other agent infrastructure provider offers an equivalent mechanism. E2B, Daytona, Modal, and CodeSandbox all inject real credentials into the execution environment, leaving them extractable through the same attack patterns documented above.
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Over-privileged MCP agents have already leaked secret tokens and credentials when prompted by attacker-controlled data inputs -- documented in incidents involving Supabase MCP and Obsidian RAG integrations. Unrestricted tool access is as dangerous as unrestricted code execution. Runloop MCP Hub aggregates all tool servers behind a single endpoint and gives you fine-grained control over which tools each agent can access.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam venenatis orci sit amet lobortis tristique. Aliquam euismod lacinia tortor.
Access to package registries and dependency sources only
Restricted to approved LLM providers (e.g., api.anthropic.com)
Zero network access. Fully locked down


Each layer operates independently. A failure at one layer does not compromise the others.
Compute Isolation
Each Devbox runs inside a dedicated MicroVM on bare-metal infrastructure with two isolation layers: hypervisor boundary and container boundary. No shared kernel, no shared state, no cross-tenant access. Ephemeral by default.
Network Enforcement
DNS-level allowlists block all egress traffic to unlisted domains. Lifecycle-aware policies restrict access per stage: broad during build, locked during runtime. Every blocked connection is logged.
Credential Protection
The Credential Gateway replaces real API keys with opaque, devbox-bound tokens. Even if an agent is compromised through prompt injection, the extracted token is useless outside the originating environment.
Tool Access Control
MCP Hub enforces per-tool permissions using pattern matching. Agents only see the tools they are authorized to use -- restricted tools are invisible. Every invocation is logged for compliance.
Every test runs in its own isolated sandbox with production-identical toolchains. The Credential Gateway injects API keys as opaque tokens bound to each sandbox. Benchmark Jobs orchestrate evaluation at scale.
from runloop import Runloop
client = Runloop(api_key="rl_live_...")
# Create an isolated sandbox
sandbox = client.sandboxes.create(
image="python:3.12",
resources={"cpu": 2, "memory": "4Gi"}
)
# Execute commands
result = sandbox.exec("python -c 'print(42)'")
print(result.stdout) # 42
# Attach credentials securely
sandbox.credentials.attach("OPENAI_API_KEY")import { Runloop } from "@runloop/sdk";
const client = new Runloop({ apiKey: "rl_live_..." });
// Spin up a sandbox environment
const sandbox = await client.sandboxes.create({
image: "node:20",
resources: { cpu: 2, memory: "4Gi" },
});
// Run code inside the sandbox
const result = await sandbox.exec("node -e 'console.log(42)'");
console.log(result.stdout); // 42
// Securely inject credentials
await sandbox.credentials.attach("OPENAI_API_KEY");# Install the Runloop CLI
curl -fsSL https://runloop.dev/install | sh
# Authenticate
runloop auth login
# Create a sandbox
runloop sandbox create --image python:3.12 --cpu 2
# Execute a command
runloop sandbox exec --id sb_abc123 "python -c 'print(42)'"
# List active environments
runloop sandbox list --status running
# Attach credentials
runloop credentials attach OPENAI_API_KEY --sandbox sb_abc123Credential management and protocol-level controls that keep your agents secure at the application layer

# Before: direct API access (insecure)
client = anthropic.Anthropic(
api_key="sk-ant-real-key-here"
)
# After: via Credential Gateway (secure)
client = anthropic.Anthropic(
base_url="https://gateway.runloop.ai",
api_key=os.environ["RL_ANTHROPIC"]
)
# That's it. Two-line change for complete credential protection.Certifications, agreements, and deployment controls for regulated environments.
Independently audited infrastructure with secure network boundaries, isolated compute, and auditable deployments. Request our SOC 2 report

Data protection controls and Business Associate Agreement availability for healthcare and life sciences workloads. Contact sales for BAA

Data residency controls, encryption at rest and in transit, and Data Processing Agreements for EU-regulated organizations. Request DPA

24/7 managed platform with dedicated oncall team. Enterprise SLAs with guaranteed response times. Architecture documentation and security questionnaire support.

*Trial Usage & Capability Limits:
Up to 3 Running Devboxes
Up to 5 Blueprints
Up to 10 Snapshots
Up to 3 Objects
Common questions about Runloop's security architecture, credential protection, and compliance posture for enterprise AI agent deployments.
Runloop's multi-tenant SaaS platform holds SOC 2 Type II certification and GDPR compliance. HIPAA-eligible architecture with Business Associate Agreement availability for healthcare workloads. BYOC deployments -- where both the control plane and data plane run in your cloud -- inherit the customer's compliance posture for infrastructure controls and provide the primitives compliance frameworks require: customer-managed KMS, audit logging, network isolation, workload identity, and declarative infrastructure. Organizations pursuing FedRAMP can leverage the VPC deployment as a foundation. Runloop provides SOC 2 reports, architecture documentation, control mappings, and penetration test summaries upon request.
Runloop Network Policies use DNS-level allowlists to control which domains a Devbox can reach. You define permitted hostnames with exact matches or wildcard prefixes, and everything not explicitly permitted is blocked -- there are no conflicting allow/deny rules to debug. Policies are lifecycle-aware: you can allow package registries during Blueprint builds, restrict to only your LLM provider endpoints during Devbox runtime, and lock down entirely during snapshot capture. Every blocked connection is logged to the Devbox log stream with the domain and timestamp, giving compliance teams complete evidence trails.
Yes. Runloop supports Bring Your Own Cloud (BYOC) deployment inside your AWS, GCP, or Azure account. Both the control plane and the data plane run inside your cloud -- provisioned in a dedicated AWS Account, GCP Project, or Azure Subscription within your organization. You maintain complete ownership of all infrastructure, data residency, network boundaries, and access policies. No other agent infrastructure provider puts both planes in the customer's environment. Connectivity options include Private Link, VPC Peering, Transit Gateway, and VPN tunnels.
Most agent sandbox providers use containers that share the host operating system kernel. A container escape vulnerability gives an attacker access to other tenants' workloads on the same host. Runloop Devboxes run inside dedicated MicroVMs on bare-metal infrastructure with two layers of isolation: the hypervisor boundary enforced by a custom bare-metal hypervisor, and a container boundary within the VM. Each Devbox gets its own kernel, filesystem, and network namespace. There is no shared state between Devboxes, and a vulnerability in one cannot propagate to another. Devboxes are ephemeral by default -- created, used, and destroyed -- reducing the window for persistent threats.
MCP Hub is a single endpoint that aggregates all MCP tool servers behind a unified access control layer. Instead of connecting agents directly to individual tool servers (GitHub, Slack, Google Calendar), the agent connects to one MCP Hub URL and sees a filtered tool list based on its permissions. You define allowed tools using pattern matching -- for example, github.search_* and github.get_* grants read-only GitHub access while github.delete_* and github.merge_* remain invisible to the agent. Each Hub token is bound to a specific Devbox, so extracted tokens cannot be reused. Every tool invocation is logged with user, tool name, timestamp, and outcome for compliance auditing.
The Credential Gateway replaces real credentials with opaque tokens that are bound to a specific Devbox and expire when that Devbox terminates. When an agent needs to call an external API, it uses the opaque token exactly like a normal API key. The gateway intercepts the request, injects the real credential server-side, and proxies to the upstream API. The real credential never exists on the Devbox, so there is nothing for a prompt injection attack to extract. Even if an attacker successfully extracts the opaque token, it cannot be used from any other environment and becomes permanently invalid when the Devbox terminates. The gateway supports bearer tokens, custom headers, basic authentication, and query parameters across HTTP/1.1, HTTP/2, SSE, and WebSocket protocols.
Every agent runs inside its own hardware-isolated MicroVM on bare-metal infrastructure. No shared kernels. No hypervisor attack surface
Traditional containers share the host kernel, enabling container escape attacks and cross-tenant data leakage.

Traditional containers share the host kernel, enabling container escape attacks and cross-tenant data leakage.
