Overview
Running Agents
3
JWT Auth Refactor
12m
Dark Mode Toggle
4m
Update Dependencies
queued
Total Tasks
127
Project Details
Git Status
Current branch:
main
Last commit: a3f82d1 — "Fix auth middleware token refresh" (2 hours ago)
Clean working tree
Skills
Attached Skills
3 skillsCode Review
Hummingbird Containers
Kubernetes
MCP Servers
Attached MCP Servers
2 serversGitHub MCP
OpenShift MCP
Knowledge Bases
Attached Knowledge Bases
1 knowledge baseAPI Documentation
Secrets & Tokens
Project-scoped secrets. These credentials are only available to agents running within this project. They are stored encrypted and never exposed in logs or agent output.
GitHub
Repository access, pull requests, and issue tracking
Personal Access Token
ghp_••••••••••••••••
Organization
acme-corp
Instance URL
https://github.com
JIRA
Issue tracking, sprint management, and project boards
API Token
ATATT3x••••••••••
Email
john.doe@acme-corp.com
Instance URL
https://acme-corp.atlassian.net
Default Project Key
KBE
Slack
Notifications, status updates, and agent alerts
Bot Token
Not configured
Default Channel
Not configured
Filesystem
Project-scoped filesystem policy. Defines which paths agents can read and write inside the sandboxed environment. This limits the blast radius of mistakes by constraining filesystem access to only declared paths.
Access Mode
Choose the default behavior for filesystem operations inside agent sandboxes.
Strict Mode
Only explicitly declared paths are accessible. All unlisted paths are blocked. Recommended for production.
Permissive Mode
Agents can access most paths except explicitly blocked ones. Better for development environments.
Allowed Operations
Read declared paths
Write to read-write paths
Access /sandbox scratch space
Write to /tmp
Blocked Operations
Access unlisted paths
Traverse with .. (path traversal)
Write to read-only paths
Follow symlinks outside sandbox
Declared Paths
6 paths~/dev/kortex-backend
Project working directory
/sandbox
Agent scratch workspace
/tmp
Temporary files
/usr/local/go
Go toolchain
/usr/local/bin
System binaries (make, git, etc.)
~/.ssh
SSH keys — explicitly blocked
Workspace File Sync
Filesystem policy settings are synced to the agentdev-workspace.yaml file under agentConfig.permissions.filesystem.
agentdev-workspace.yaml
Synced
agentConfig:
permissions:
filesystem:
mode: strict
readWrite:
- "~/dev/kortex-backend"
- "/sandbox"
- "/tmp"
readOnly:
- "/usr/local/go"
- "/usr/local/bin"
blocked:
- "~/.ssh"
Network Policy
Project-scoped network policy. Controls what external hosts agents can reach when running tasks in this project. Agents operating inside sandboxed workspaces will have their HTTP/HTTPS traffic filtered according to these rules.
Policy Mode
Choose the default behavior for outbound network requests from agent sandboxes.
Allow Mode
Permit all traffic except explicitly blocked hosts. Best for development environments.
Deny Mode
Block all traffic except explicitly allowed hosts. Recommended for production or sensitive projects.
Allowed Hosts
5 hostsgithub.com
Git operations, API access
pkg.go.dev
Go package documentation
registry.npmjs.org
npm package registry
proxy.golang.org
Go module proxy
sum.golang.org
Go checksum database
Blocked CIDR Ranges
4 ranges10.0.0.0/8
Private network (Class A)
172.16.0.0/12
Private network (Class B)
192.168.0.0/16
Private network (Class C)
169.254.0.0/16
Link-local addresses