ยท aka: Silent Sandbox Bypass, Docker Fallback Exploitation, Sandbox Downgrade Attack
Code execution sandboxes silently degrade to insecure fallback modes when the underlying isolation mechanism (Docker, container runtime) becomes unavailable. No user notification, consent, or logging occurs during degradation.
Full host-level arbitrary code execution. In multi-agent deployments, one agent can exhaust Docker resources to force other agents into the insecure fallback.
Agent with code execution capability (allow_code_execution=True or CodeInterpreter tool). Docker unavailable or stoppable.
๐ Full defence implementations available through the NAIL SDK.