---
title: "Wire Up the Sandbox"
description: "Initialize a Vercel Sandbox in lib/agent.ts, pass it to createBashTool, and give the agent its first working tool. The agent can now run bash commands."
canonical_url: "https://vercel.com/academy/filesystem-agents/wire-up-sandbox"
md_url: "https://vercel.com/academy/filesystem-agents/wire-up-sandbox.md"
docset_id: "vercel-academy"
doc_version: "1.0"
last_updated: "2026-04-11T09:13:35.699Z"
content_type: "lesson"
course: "filesystem-agents"
course_title: "Building Filesystem Agents"
prerequisites:  []
---

<agent-instructions>
Vercel Academy — structured learning, not reference docs.
Lessons are sequenced.
Adapt commands to the human's actual environment (OS, package manager, shell, editor) — detect from project context or ask, don't assume.
The lesson shows one path; if the human's project diverges, adapt concepts to their setup.
Preserve the learning goal over literal steps.
Quizzes are pedagogical — engage, don't spoil.
Quiz answers are included for your reference.
</agent-instructions>

# Wire Up the Sandbox

# Wire Up the Sandbox

When building AI agents that execute code, you're essentially letting an LLM run arbitrary commands on your system. This introduces significant security risks:

- **Unpredictable outputs**: LLMs can hallucinate or generate malformed commands that behave unexpectedly
- **Prompt injection**: Malicious user input could trick the agent into running harmful commands like `rm -rf /` or accessing sensitive files
- **Resource exhaustion**: An infinite loop or memory-intensive command could crash your server
- **Data exfiltration**: Without isolation, the agent could read environment variables, credentials, or private data

A sandbox provides an isolated execution environment that protects your host system. With [Vercel Sandbox](https://vercel.com/docs/functions/sandbox):

- Commands run in a separate container with no access to your actual filesystem
- Network access can be restricted
- Resource limits prevent runaway processes
- Even if the LLM generates dangerous commands, they can't affect your production environment

This means you can safely give your agent powerful tools like bash execution without worrying about what happens if something goes wrong.

## Outcome

Your agent has a live `Sandbox` and a connected `bashTool`. It can execute bash commands, though it has no files to explore yet.

## Fast Track

1. Import `Sandbox` from `@vercel/sandbox` and `createBashTool` from `./tools` in `lib/agent.ts`
2. Create a sandbox with `await Sandbox.create()` and pass it to `createBashTool`
3. Add `bashTool` to the agent's `tools` object

## Hands-on Exercise 2.1

Update `lib/agent.ts` to initialize the sandbox and wire up the bash tool.

**Requirements:**

1. Import `Sandbox` from `@vercel/sandbox` and `createBashTool` from `./tools`
2. Create a sandbox instance with `await Sandbox.create()`
3. Pass the sandbox to `createBashTool` and add the result to the agent's `tools`
4. Keep instructions as an empty string for now

**Implementation hints:**

- `Sandbox.create()` is async, so use top-level `await` (supported in Next.js server modules)
- The sandbox must be created before the agent definition since the agent needs the tool at construction time
- The key name in the `tools` object (`bashTool`) is what the LLM sees, so keep it descriptive

### Init the sandbox

In `agent.ts`, initialize the sandbox above the agent definition:

```ts title="lib/agent.ts"
import { Sandbox } from '@vercel/sandbox';

const sandbox = await Sandbox.create();
```

You can now pass this sandbox to the `createBashTool` function to create the tool in the agent:

```ts title="lib/agent.ts"
import { createBashTool } from './tools';

export const agent = new ToolLoopAgent({
  // ...
  tools: {
    bashTool: createBashTool(sandbox)
  }
});
```

The agent now has access to the bash tool, but there are no files mounted to the sandbox for the agent to explore. You need to load files into the sandbox before you run the agent.

## Try It

1. **Restart the dev server** (`pnpm dev`) and open `http://localhost:3000`.

2. **Ask the agent:** "list the files in the current directory"

3. **Watch the response.** You should see the agent call `bashTool` with a command like `ls`. The output shows the sandbox's root directory, which is mostly empty because you haven't loaded any files yet.

   ```
   [bashTool] $ ls
   ```

   The output is sparse (maybe just system directories) because the sandbox starts clean. You'll load the call transcripts in the next lesson.

\*\*Warning: Empty sandbox is expected\*\*

If the agent runs `ls` and shows minimal output, that's correct. The sandbox is a fresh container with no user files. The next lesson loads the call transcripts into it.

## Commit

```bash
git add lib/agent.ts
git commit -m "feat(agent): init sandbox and connect bash tool"
```

## Done-When

- [ ] `lib/agent.ts` creates a sandbox with `Sandbox.create()`
- [ ] The bash tool is wired up in the agent's `tools` object
- [ ] The agent can execute bash commands (visible in the chat UI as tool calls)
- [ ] The sandbox is empty (no call files loaded yet)

## Solution

```ts title="lib/agent.ts" {2-3,7,12-13}
import { ToolLoopAgent } from 'ai';
import { createBashTool } from './tools';
import { Sandbox } from '@vercel/sandbox';

const MODEL = 'anthropic/claude-opus-4.6';

const sandbox = await Sandbox.create();

export const agent = new ToolLoopAgent({
  model: MODEL,
  instructions: '',
  tools: {
    bashTool: createBashTool(sandbox)
  }
});
```


---

[Full course index](/academy/llms.txt) · [Sitemap](/academy/sitemap.md)
