spawn/e2b
A f1e8d946df
fix: secure upload_file functions against command injection in 5 clouds (#453)
Replace unsafe printf '%q'-escaped unquoted variables with validated
single-quoted embedding in upload_file() for fly, northflank, daytona,
e2b, and koyeb. The previous pattern used unquoted $escaped_content and
$escaped_path in command strings passed to bash -c or run_server, which
could allow command injection via crafted filenames.

The fix:
- Validates remote_path rejects unsafe chars (', $, `, newlines)
- Uses base64 content directly (alphanumeric + /+= is shell-safe)
- Single-quotes both content and path in the command string
- Uses printf '%s' instead of echo for safer output

Matches the pattern already used by render, modal, and railway.

Agent: security-auditor

Co-authored-by: A <6723574+louisgv@users.noreply.github.com>
Co-authored-by: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-02-11 06:28:45 -08:00
..
lib fix: secure upload_file functions against command injection in 5 clouds (#453) 2026-02-11 06:28:45 -08:00
aider.sh refactor: Extract ENV_TEMP pattern to inject_env_vars_local (E2B) 2026-02-08 04:06:33 +00:00
amazonq.sh refactor: Extract ENV_TEMP pattern to inject_env_vars_local (E2B) 2026-02-08 04:06:33 +00:00
claude.sh QA-Bot setup (#335) 2026-02-10 19:51:07 -08:00
cline.sh refactor: Extract ENV_TEMP pattern to inject_env_vars_local (E2B) 2026-02-08 04:06:33 +00:00
codex.sh refactor: Extract ENV_TEMP pattern to inject_env_vars_local (E2B) 2026-02-08 04:06:33 +00:00
continue.sh fix: Escape API keys in continue.sh JSON configs to prevent injection (#374) 2026-02-11 00:13:19 -08:00
gemini.sh refactor: Extract ENV_TEMP pattern to inject_env_vars_local (E2B) 2026-02-08 04:06:33 +00:00
goose.sh refactor: Extract ENV_TEMP pattern to inject_env_vars_local (E2B) 2026-02-08 04:06:33 +00:00
gptme.sh refactor: Extract ENV_TEMP pattern to inject_env_vars_local (E2B) 2026-02-08 04:06:33 +00:00
interpreter.sh refactor: Extract ENV_TEMP pattern to inject_env_vars_local (E2B) 2026-02-08 04:06:33 +00:00
kilocode.sh feat: Add kilocode scripts for e2b, modal, fly, civo, scaleway, daytona (#113) 2026-02-09 19:45:51 -08:00
nanoclaw.sh refactor: Extract ENV_TEMP pattern to inject_env_vars_local (E2B) 2026-02-08 04:06:33 +00:00
openclaw.sh refactor: Extract ENV_TEMP pattern to inject_env_vars_local (E2B) 2026-02-08 04:06:33 +00:00
opencode.sh fix: Use robust OpenCode install method across all clouds (#48) 2026-02-07 23:02:18 -08:00
plandex.sh Add Plandex coding agent with 14 cloud implementations (#36) 2026-02-07 21:35:04 -08:00
README.md fix: Improve CLI error handling, fix bash compat, and update cloud READMEs (#90) 2026-02-09 09:33:57 -08:00

E2B

E2B sandboxed cloud containers via CLI/SDK. E2B

No SSH — uses E2B CLI for exec. Sandboxes start in ~150ms. Requires npm install -g @e2b/cli.

Agents

Claude Code

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/claude.sh)

OpenClaw

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/openclaw.sh)

NanoClaw

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/nanoclaw.sh)

Aider

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/aider.sh)

Goose

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/goose.sh)

Codex CLI

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/codex.sh)

Open Interpreter

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/interpreter.sh)

Gemini CLI

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/gemini.sh)

Amazon Q CLI

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/amazonq.sh)

Cline

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/cline.sh)

gptme

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/gptme.sh)

OpenCode

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/opencode.sh)

Plandex

bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/plandex.sh)

Non-Interactive Mode

E2B_SANDBOX_NAME=dev-mk1 \
E2B_API_KEY=your-key \
OPENROUTER_API_KEY=sk-or-v1-xxxxx \
  bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/claude.sh)