Security Features
- Container Isolation: Each execution runs in a separate Docker container
- Network Isolation: No outbound network access by default
- Resource Limits: CPU, memory, and time limits enforced
- Read-only Filesystem: Code cannot persist changes
- API Key Authentication: All requests require valid API key
Best Practices
- Always use strong API keys
- Set appropriate resource limits
- Monitor execution logs
- Rotate API keys regularly