docs: add Firecracker microVM isolation guide#737
Conversation
|
All PRs must reference a prior Discord discussion to ensure community alignment before implementation. Please edit the PR description to include a link like: This PR will be automatically closed in 3 days if the link is not added. |
OpenAB PR ScreeningThis is auto-generated by the OpenAB project-screening flow for context collection and reviewer handoff.
Screening report## IntentPR #737 adds documentation for running OpenAB agents with Firecracker microVM isolation through Kata Containers on K3s. The operator-visible problem is that OpenAB’s current Kubernetes pod sandbox shares the host kernel. For deployments running untrusted or higher-risk agent workloads, that leaves a meaningful isolation gap. The guide aims to document a stronger runtime boundary where each agent pod can run inside a microVM with its own kernel. FeatThis is a docs improvement. Behaviorally, it does not change OpenAB code. It adds Who It ServesPrimary beneficiaries:
Secondary beneficiaries:
Rewritten PromptAdd a deployment guide at The guide should include:
Keep the guide explicit that this is an optional hardening path, not the default runtime requirement. Avoid overstating security guarantees; describe Firecracker as reducing shared-kernel risk by moving workloads into microVMs. Merge PitchThis is worth advancing because it documents a practical hardening path for operators who need stronger isolation than standard Kubernetes pods. It also gives reviewers and future deployers a concrete reference instead of leaving Firecracker support as tribal knowledge. Risk profile is low because the PR is documentation-only. The main reviewer concern should be accuracy: whether the K3s/Kata commands are current, whether Best-Practice ComparisonOpenClaw principles that are relevant:
Hermes Agent principles that are relevant:
The strongest comparison point is isolated execution. This PR aligns with the direction of treating agent execution as a security-sensitive runtime concern, but it does not implement scheduling, persistence, locking, or run lifecycle behavior. Implementation OptionsOption 1: Conservative docs-only merge Option 2: Balanced docs plus config example Option 3: Ambitious runtime isolation profile Comparison Table
RecommendationAdvance the PR with the balanced option if the existing Helm surface supports it cleanly: keep That gives Masami or Pahud a mergeable next step with low code risk and high operator value. Defer first-class runtime profiles or trust-based scheduling to a separate follow-up issue, since that would move beyond documentation into runtime policy design. |
PR Review: #737Reviewed commit: Summary
Core Assessment
Review Summary (Traffic Light)🔴 Critical:
|
Closes #736
What
Adds
docs/firecracker.md— a guide for running OpenAB agents inside Firecracker microVMs via Kata Containers on K3s.Why
OpenAB's current sandbox uses K8s pod isolation (shared kernel). Firecracker provides microVM isolation (independent kernel per agent) — the strongest boundary available. This is relevant for users who want defense against kernel exploits.
Content
podRuntimeClassName: kata-fc