shipfeedAI news, curated daily

00:37:07 CET
21 MAY00:37:07shipfeed
pull to refreshlast sync
Just in — 30 new
§ feed · storyline

Advanced egress firewall filtering for Vercel Sandbox

Vercel Sandbox adds egress firewall filtering via SNI inspection and CIDR rules, letting developers restrict outbound network access for untrusted or AI-generated code to approved hosts only.

Feb 11 · · primary fetch1 sourceupdated Feb 11 ·

can now enforce egress network policies through Server Name Indication (SNI) filtering and CIDR blocks, giving you control over which hosts a sandbox can reach. Outbound TLS connections are matched against your policy at the handshake, unauthorized destinations are rejected before any data is transmitted.Vercel Sandbox By default, sandboxes have unrestricted internet access. When running untrusted or AI generated code, you can lock down the network to only the services your workload actually needs. A compromised or hallucinated code snippet cannot exfiltrate data or make unintended API calls, traffic to any domain not on your allowlist is blocked.

The modern internet runs on hostnames, not IP addresses, a handful of addresses serve thousands of domains. Traditional IP-based firewall rules can't precisely distinguish between them. Host-based egress control typically requires an HTTP proxy, but that breaks non-HTTP protocols like Redis and Postgres. Instead, we built an SNI-peeking firewall that inspects the initial unencrypted bytes of a TLS handshake to extract the target hostname. Since nearly all internet traffic is TLS-encrypted today, this covers all relevant cases. For…

read full article on vercel.com
§ sources1 publication · timeline below
  1. vercel.comAdvanced egress firewall filtering for Vercel Sandboxprimary
Advanced egress firewall filtering for Vercel Sandbox · shipfeed