Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.neoagent.io/llms.txt

Use this file to discover all available pages before exploring further.

The sandbox gives a Neo Agent a temporary, isolated Linux environment for the run: a shell, plus simple file read and write. Use it for data wrangling that doesn’t fit a fixed tool — parsing an export, running a quick script, transforming a file, assembling a report — without giving the agent access to anything outside the sandbox.
Turn this on with the Sandbox switch in the agent’s settings (Agent Settings → Sandbox). It enables three tools together: Sandbox Bash, Sandbox Read File, and Sandbox Write File. The sandbox is created fresh for the run and discarded afterwards — nothing persists between runs.

What It Does

ToolWhat it doesTier
Sandbox BashRun a shell command in the sandbox and read its outputStandard
Sandbox Read FileRead a file from the sandboxBasic
Sandbox Write FileWrite a file in the sandboxBasic
Typical uses:
  • Parse or reshape a CSV/JSON export the agent fetched from another tool
  • Run a one-off calculation or text transformation
  • Build an intermediate file the agent then attaches via Generate Artifact

Safety

ControlBehavior
Isolated and ephemeralThe sandbox can’t reach your PSA, RMM, M365, or Neo’s internals — it only sees what the agent puts in it. It’s destroyed at the end of the run.
Off by defaultNothing runs in a sandbox unless you enable the Sandbox setting on the agent.
Test modeWhen test mode is on, sandbox commands that would have external side effects are not executed.

How to Configure

1

Open the agent's settings

In the workflow’s agent configuration, find Agent Settings.
2

Enable Sandbox

Flip the Sandbox switch. The three sandbox tools become available to the agent for that workflow.
3

Guide it with custom instructions

Tell the agent when to use the sandbox versus a dedicated tool — e.g. “use the sandbox to parse the exported CSV before summarising it”.
Reach for the sandbox only when no dedicated tool fits. For PSA, RMM, M365, IT Glue, Hudu, or Neo’s own API, use those tools directly — they’re safer and produce cleaner audit trails.