Free
Evaluate
Safe public cap
Included volume
20/day
Try the Agent profile at a safe public cap.
- 2 requests / minute
- 20 requests / day
- 1 GB memory - 30s wall
- Filtered network
- All 8 languages
- Community support
Execute code from users, agents, and LLMs in kernel-isolated sandboxes. 8 languages, 36ms latency, evidence-backed verdicts.
42
emptyOne API, two isolation profiles. Your API key maps to a profile - same endpoint, same contract, different resource limits.
#include <iostream>
using namespace std;
int main() {
int n; cin >> n;
// O(N) solution
long long sum = 0;
for(int i=1; i<=n; i++)
sum += i;
cout << sum;
return 0;
}Try Judge mode from the landing page: switch languages, edit code, resize panels, provide stdin, and inspect the same structured verdict shape your API integration receives.
Every execution passes through 8 kernel isolation layers. Order enforced at compile time by Rust's type system.
PID namespace, mount namespace, network namespace, cgroup v2, seccomp-bpf (52 rules), no_new_privileges, read-only rootfs.
Rust typestate chain. Skip a step and it does not compile. Order is a language guarantee, not a runtime check.
22 adversarial vectors across all 8 languages. Fork bombs, symlink escapes, /proc abuse, ptrace - all blocked.
across 22 adversarial attack vectors
Every API call gets the same isolation.
No tiers. No shortcuts.
Sieve of Eratosthenes (n=500,000), full kernel isolation, single-threaded.
AMD Ryzen 7 9700X · 4 vCPUs · 4 GB RAM · Linux 6.12
One POST, one structured response. No SDK, no WebSocket, no polling for simple submissions.
curl -X POST https://rustbox-api.orkait.com/api/submit \
-H "Content-Type: application/json" \
-H "X-API-Key: rb_live_your_key_here" \
-d '{"language":"python","code":"print(42)","stdin":""}'{
"completed_at": "2026-04-03T08:05:23.570195915+00:00",
"cpu_time_secs": 0.009142,
"created_at": "2026-04-03T08:05:23.540110054+00:00",
"error_message": null,
"evidence": {
"cgroup": {
"cpu_usage_usec": 9142,
"memory_limit_bytes": 268435456,
"memory_peak_bytes": 3862528,
"oom_events": 0,
"oom_kill_events": 0,
"process_count": 0,
"process_limit": 10
},
"collection_errors": [],
"controls_applied": [
"pid_namespace",
"mount_namespace",
"network_namespace",
"memory_limit",
"process_limit",
"no_new_privileges"
],
"controls_missing": [],
"isolation_mode": "strict",
"judge_actions": [],
"process_lifecycle": {
"descendant_containment": "ok",
"reap_status": "clean",
"zombie_count": 0
},
"timing": {
"cpu_ms": 9,
"cpu_wall_ratio": 0.9,
"divergence": "cpu_bound",
"wall_ms": 10
},
"verdict_actor": "runtime",
"verdict_cause": "normal_exit"
},
"exit_code": 0,
"id": "f2c6c5f7-1203-46e5-8a4f-a619c12bfeb0",
"job_status": "completed",
"language": "python",
"memory_peak_bytes": 3862528,
"output_integrity": "complete",
"schema_version": "1.0",
"signal": null,
"started_at": "2026-04-03T08:05:23.540218508+00:00",
"stderr": "",
"stdout": "42\n",
"verdict": "AC",
"wall_time_secs": 0.01
}1,000 submissions · 30 days · no credit card
Higher-room sandboxing for tool calls, interpreters, and short-lived REPLs.
Evaluate
Safe public cap
Included volume
20/day
Try the Agent profile at a safe public cap.
Scale
Priority agent route
Included volume
Unlimited
AI agent tool-calls without the stingy cap.
Enterprise
Custom policy lane
Included volume
Unlimited
Production agent workloads with SLA.
Short answers for the constraints that usually matter before teams add sandbox execution to a product.
Need a specific answer?
Send the workload shape, expected volume, language mix, and security requirements through the contact page.