Skip to content

Container Runtime

gVisor

Using gVisor as the container runtime wherever possible is recommended for good security practice when running untrusted LLM-generated code in containers. The built-in Helm chart uses gvisor as the container runtime class name unless you specify otherwise (see built-in chart).

There are however some differences in behaviour between using gVisor (which uses the runsc runtime) and the default runc runtime. This may make some Cyber misuse evals harder or impossible to solve.

gVisor blocks certain low-level system calls such as directly creating and sending packets with hashcat.

gVisor may prevent certain security vulnerabilities from being exploited, such as breaking out of chroot jails.

gVisor may prevent agents from using password-based SSH authentication using tools like sshpass. They can still use key-based SSH authentication or password-based SSH authentication using tools like paramiko.

Info

To determine whether gVisor is being used as the runtime for a container or not, open a shell into the container and run sudo dmesg | grep gvisor. If there is a match, then gVisor is being used.