Global Options
These options work with all commands.--silent, -s
Suppress all nono output (banner, summary, status messages). Only the executed command’s output will be shown.
Commands
nono run
Run a command inside the sandbox.
nono shell
Start an interactive shell inside the sandbox.
nono why
Check why a path or network operation would be allowed or denied. Designed for both human debugging and programmatic use by AI agents.
nono learn
Trace a command to discover required filesystem paths. Uses strace to monitor file accesses and outputs paths that would need to be allowed in a nono profile. (Linux only)
nono setup
Set up nono on this system. Verifies installation, tests sandbox support, and optionally generates example profiles.
nono trust
Manage instruction file attestation. Sign, verify, and manage trust for AI agent instruction files.
sign- Sign instruction filessign-policy- Sign a trust policy fileverify- Verify instruction files against the trust policylist- List instruction files and their verification statuskeygen- Generate a new signing key pairexport-key- Export the public key for a signing key
nono learn Options
nono learn is only available on Linux as it requires strace. The command runs WITHOUT sandbox restrictions to discover what paths your application needs.--profile, -p
Compare against an existing profile to show only missing paths.
--toml
Output discovered paths as a TOML fragment suitable for a profile.
--timeout
Limit trace duration in seconds.
--all
Show all accessed paths, not just those that would be blocked by the sandbox.
--verbose, -v
Enable verbose output. Can be specified multiple times.
nono run Options
Directory Permissions
These flags grant recursive access to directories and all their contents.--allow, -a
Grant read and write access to a directory.
--read, -r
Grant read-only access to a directory.
--write, -w
Grant write-only access to a directory.
File Permissions
These flags grant access to individual files only (non-recursive).--allow-file
Grant read and write access to a single file.
--read-file
Grant read-only access to a single file.
--write-file
Grant write-only access to a single file.
Network Control
--net-block
Block all network access. Network is allowed by default.
--network-profile
Use a predefined network profile for host-level filtering. When set, outbound traffic is routed through a localhost proxy that only allows connections to hosts in the profile.
claude-code, minimal, enterprise. See Network Proxy for details.
--network-profile and --proxy-allow activate proxy mode, which forces supervised execution. The proxy runs in the unsandboxed parent process.--proxy-allow
Allow a specific host through the network proxy. Can be specified multiple times. Activates proxy mode if not already active.
--proxy-credential
Enable credential injection for a named service via the reverse proxy. The service must be either a built-in service (openai, anthropic, gemini, google-ai) or defined as a custom credential in your profile. Credentials are loaded from the system keyring under the nono service name.
OPENAI_BASE_URL, ANTHROPIC_BASE_URL, etc. in the child environment so SDKs route through the proxy automatically.
Custom credentials can be defined in profiles for APIs not covered by the built-in services:
--external-proxy
Chain outbound connections through an external (enterprise) proxy. The default deny list (cloud metadata, private networks) is still enforced.
--allow-bind
Allow the sandboxed process to bind and listen on a TCP port. Required when running server applications (like AI gateways) in proxy mode.
--allow-bind only has effect in proxy mode (when --network-profile or --proxy-allow is active). Without proxy mode, network operations use the default OS-level allow/deny and bind is not restricted.nono shell Options
nono shell supports the same permission, profile, secrets, and dry-run flags as nono run, plus:
--shell
Override the shell binary.
Command Blocking
--allow-command
Allow a normally-blocked dangerous command. By default, destructive commands like rm, dd, chmod are blocked. Use this flag to override for a specific command.
Even with
--allow-command, the kernel sandbox still restricts file operations to granted paths. A command can only affect files within directories you explicitly allowed.Command blocking is a best-effort surface-level control. It matches against the executable name being invoked directly. It does not prevent a process from performing the equivalent operation through language-level APIs (e.g.,
os.remove() in Python), shell built-ins, or renamed binaries. For hard protection against destructive filesystem operations, rely on kernel-enforced deny groups (deny.access, deny.unlink) and path-based sandboxing, which apply regardless of how the operation is invoked.--block-command
Block an additional command beyond the default blocklist.
Credential Options
--env-credential
Load credentials from the system keystore (macOS Keychain / Linux Secret Service) and inject them as environment variables. The sandboxed process can read these credentials directly.
- Loaded before the sandbox is applied (keystore access blocked after)
- Auto-named by uppercasing:
openai_api_keybecomes$OPENAI_API_KEY - Zeroized from memory after
exec()
--proxy-credential instead for credential isolation — the agent never sees the real API key.
See Secrets Management for full documentation on storing and using credentials.
Profile Options
--profile, -p
Use a named profile (built-in or from ~/.config/nono/profiles/).
--workdir
Working directory for $WORKDIR expansion in profiles (defaults to current directory).
--allow-cwd
Allow access to the current working directory without prompting. By default, nono prompts interactively for CWD sharing. The access level is determined by the profile’s [workdir] config or defaults to read-only.
Execution Mode Flags
--rollback
Enable atomic rollback snapshots for the session. Takes content-addressable snapshots of writable directories so you can restore to the pre-session state after the command exits. Automatically selects supervised execution.
--supervised
Enable the approval sidecar for runtime capability expansion. On Linux, the supervisor can grant additional filesystem access via seccomp user notification when the sandboxed process requests it.
--rollback for both snapshots and capability expansion:
--no-rollback-prompt
Suppress the interactive post-exit review when using --rollback. Snapshots are still taken but the user is not prompted to review or restore changes. Useful for scripting.
--exec
Use direct execution mode. nono applies the sandbox and then exec()s directly into the target command. No parent process remains.
--no-diagnostics
Suppress the diagnostic footer when the command exits non-zero. Useful for scripts that parse stderr and need stable output.
Operational Flags
--dry-run
Show what capabilities would be granted without actually executing the command or applying the sandbox.
--verbose, -v
Increase logging verbosity. Can be specified multiple times.
| Flag | Level | Output |
|---|---|---|
| (none) | Error | Only errors |
-v | Info | Informational messages |
-vv | Debug | Detailed debug output |
-vvv | Trace | Full trace output |
--trust-override
Disable trust verification for instruction files. Skips the pre-exec trust scan that verifies cryptographic signatures on instruction files (SKILLS*, CLAUDE*, AGENT*, .claude/**/*.md). For development and testing only.
Using
--trust-override in production is not recommended. It disables the entire instruction file attestation pipeline, allowing unsigned or tampered instruction files to be read by the sandboxed process.--config, -c
Specify a configuration file path.
Configuration file support is planned for a future release.
nono why Options
The why command checks why a path or network operation would be allowed or denied. It’s designed for both human debugging and programmatic use by AI agents.
--path
The filesystem path to check.
--op
The operation to check: read, write, or readwrite. Defaults to read if not specified.
--host
Network host to check (instead of --path).
--port
Network port (default: 443). Used with --host.
--json
Output JSON instead of human-readable format. Useful for programmatic use by AI agents.
--self
Query current sandbox state from inside a sandboxed process. This allows agents to introspect their own capabilities.
Capability Context Options
When checking paths outside a sandbox, you can simulate a capability context:--allow,-a- Directories with read+write access--read,-r- Directories with read-only access--write,-w- Directories with write-only access--allow-file- Single files with read+write access--read-file- Single files with read-only access--write-file- Single files with write-only access--net-block- Block network access--profile,-p- Use a named profile--workdir- Working directory for$WORKDIRexpansion
nono trust Options
nono trust sign
Sign instruction files, producing bundles for verification.
| Option | Description |
|---|---|
--all | Sign all instruction files matching trust policy patterns |
--key <KEY_ID> | Key ID from system keystore (default: “default”) |
--keyless | Use Sigstore keyless signing (CI environments only) |
--policy <FILE> | Trust policy file (default: auto-discover) |
When signing multiple files, a single
.nono-trust.bundle multi-subject bundle is created. Single-file signing creates per-file .bundle sidecars.nono trust sign-policy
Sign a trust policy file.
nono trust verify
Verify instruction files against the trust policy.
nono trust list
List instruction files and their verification status.
nono trust keygen
Generate an ECDSA P-256 signing key pair and store it in the system keystore.
nono trust export-key
Export the public key for use in trust policy public_key fields.
nono setup Options
--check-only
Only verify installation and sandbox support, don’t create any files.
--profiles
Generate example user profiles in ~/.config/nono/profiles/.
--shell-integration
Show shell integration instructions (aliases, etc.).
--verbose, -v
Show detailed information during setup. Can be specified multiple times.
Exit Codes
| Code | Meaning |
|---|---|
| 0 | Command executed successfully |
| 1 | nono error (invalid arguments, sandbox failure) |
| * | Exit code from the executed command |
Path Resolution
All paths are canonicalized before the sandbox is applied:- Relative paths are resolved to absolute paths
- Symlinks are followed and resolved
- Parent directory references (
..) are resolved