spawn/github-codespaces
A a79dd226ac
fix(security): prevent API key injection in koyeb/nanoclaw.sh and harden remote temp file permissions (#1049)
koyeb/nanoclaw.sh embedded the API key directly in a run_server command
string using single quotes. If the key contained a single quote, it could
break out and enable command injection. Replaced with the safe mktemp +
upload_file pattern used by all other nanoclaw scripts.

Also added chmod 600 before mv on remote /tmp/nanoclaw_env in 8 nanoclaw
scripts to restrict permissions on the credential file during transfer.

Agent: security-auditor

Co-authored-by: A <6723574+louisgv@users.noreply.github.com>
Co-authored-by: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-02-13 23:37:25 -05:00
..
lib fix: add actionable guidance to destroy_server failures and service timeouts (#959) 2026-02-13 09:38:58 -08:00
aider.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
amazonq.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
claude.sh fix: add actionable guidance to agent installation failures across 126 scripts (#966) 2026-02-13 10:14:03 -08:00
cline.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
codex.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
continue.sh fix: replace unsafe inline API key injection with secure helpers (#676) 2026-02-12 15:03:12 -08:00
gemini.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
goose.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
gptme.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
interpreter.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
kilocode.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
nanoclaw.sh fix(security): prevent API key injection in koyeb/nanoclaw.sh and harden remote temp file permissions (#1049) 2026-02-13 23:37:25 -05:00
openclaw.sh fix(security): replace unquoted heredocs with printf to prevent shell expansion in API keys (#1031) 2026-02-13 19:41:10 -05:00
opencode.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
plandex.sh fix: use log_step (cyan) for in-progress messages instead of log_info (green) (#757) 2026-02-12 15:48:38 -08:00
README.md refactor: replace Python with jq in Hetzner lib, fix /lab → /labs URLs (#827) 2026-02-12 23:14:11 -08:00

GitHub Codespaces

GitHub Codespaces development environments via gh CLI. GitHub Codespaces

Agents

Claude Code

bash <(curl -fsSL https://openrouter.ai/labs/spawn/github-codespaces/claude.sh)

Aider

bash <(curl -fsSL https://openrouter.ai/labs/spawn/github-codespaces/aider.sh)

gptme

bash <(curl -fsSL https://openrouter.ai/labs/spawn/github-codespaces/gptme.sh)

Non-Interactive Mode

GITHUB_REPO=OpenRouterTeam/spawn \
OPENROUTER_API_KEY=sk-or-v1-xxxxx \
  bash <(curl -fsSL https://openrouter.ai/labs/spawn/github-codespaces/claude.sh)

Environment Variables

Variable Description Default
GITHUB_REPO Repository for codespace OpenRouterTeam/spawn
CODESPACE_MACHINE Machine type basicLinux32gb
CODESPACE_IDLE_TIMEOUT Idle timeout 30m
OPENROUTER_API_KEY OpenRouter API key (OAuth or prompted)

Pricing

GitHub Codespaces uses pay-as-you-go pricing:

  • Compute: Starting at $0.18/hr for basicLinux32gb (2 core, 4GB RAM)
  • Storage: $0.07/GB per month
  • Free tier: Available for personal accounts (limited hours/month)

See GitHub Codespaces pricing for details.

Prerequisites

  • GitHub CLI (gh) installed and authenticated
  • Active GitHub account
  • Repository access (default: OpenRouterTeam/spawn)

Machine Types

Machine Cores RAM Price/hr
basicLinux32gb 2 4GB $0.18
standardLinux32gb 4 8GB $0.36
premiumLinux 8 16GB $0.72
largePremiumLinux 16 32GB $1.44

Set via CODESPACE_MACHINE environment variable.