brew tap use-tusk/tap
brew install use-tusk/tap/fenceTo update:
brew upgrade use-tusk/tap/fencenix run nixpkgs#fence -- --helpThis runs it directly from the repository, without installing fence. If you want to install it, follow the guidelines from NixOS or nix-darwin.
git clone https://github.com/Use-Tusk/fence
cd fence
go build -o fence ./cmd/fence
sudo mv fence /usr/local/bin/go install github.com/Use-Tusk/fence/cmd/fence@latestOn Linux, you also need:
# Ubuntu/Debian
sudo apt install bubblewrap socat
# Fedora
sudo dnf install bubblewrap socat
# Arch
sudo pacman -S bubblewrap socatNo, for most Linux systems. Fence works without root privileges because:
- Package-manager-installed
bubblewrapis typically already setuid - Fence detects available capabilities and adapts automatically
If some features aren't available (like network namespaces in Docker/CI), fence falls back gracefully - you'll still get filesystem isolation, command blocking, and proxy-based network filtering.
Run fence --linux-features to see what's available in your environment.
fence --versionBy default, fence blocks all network access:
# This will fail - network is blocked
fence curl https://example.comYou should see something like:
curl: (56) CONNECT tunnel failed, response 403
Create a starter config:
fence config initBy default, this writes {"extends":"code"} to $XDG_CONFIG_HOME/fence/fence.json on Linux (typically ~/.config/fence/fence.json) and ~/.config/fence/fence.json on macOS, so common coding workflows work out of the box.
If you want a starter file with empty arrays as editable hints, use:
fence config init --scaffoldYou can also create a fully custom config manually:
{
"network": {
"allowedDomains": ["example.com"]
}
}Now try again:
fence curl https://example.comThis time it succeeds!
Use -d to see what's happening under the hood:
fence -d curl https://example.comThis shows:
- The sandbox command being run
- Proxy activity (allowed/blocked requests)
- Filter rule matches
Use -m to see only violations and blocked requests:
fence -m npm installThis is useful for:
- Auditing what a command tries to access
- Debugging why something isn't working
- Understanding a package's network behavior
Use -c to run compound commands:
fence -c "echo hello && ls -la"If you're running a server that needs to accept connections:
fence -p 3000 -c "npm run dev"This allows external connections to port 3000 while keeping outbound network restricted.
- Read Why Fence to understand when fence is a good fit (and when it isn't).
- Learn the mental model in Concepts.
- Use Troubleshooting if something is blocked unexpectedly.
- Start from copy/paste configs in
docs/templates/. - Follow workflow-specific guides in Recipes (npm/pip/git/CI).