VM-isolated code execution for agents — Python, Playwright, persistent Jupyter kernel, all sandboxed off your host.
CodeRunner gives Claude (and other agents) a secure, persistent sandbox: run Python with a long-lived Jupyter kernel, scrape with Playwright, manipulate PDFs and images. Container-based VM-level isolation means you can let an agent execute untrusted code without trashing your machine. Exposes itself as MCP so it works in any client.
claude mcp add coderunner-skill -- git clone https://github.com/instavm/coderunner ~/.claude/skills/coderunner
One-liner. Verify with claude mcp list. Remove with claude mcp remove.
Use Cases
Real-world ways to use CodeRunner
Let Claude run untrusted code without putting your laptop at risk
👤 Devs experimenting with auto-generated code⏱ ~15 minintermediate
When to use: You want Claude to write + run a script you didn't fully review.
Prerequisites
macOS Apple Silicon + Python 3.10+ — Current limitation; Linux support varies
Skill installed — git clone + ./install.sh per project README
Flow
Hand it the task
Use coderunner. Write a Python script that downloads my Strava activities CSV from <url>, parses, and computes weekly mileage. Run it in the sandbox.✓ Copied
→ Script executed; output shown; nothing touched my filesystem
Iterate
Add a chart of weekly mileage. Re-run.✓ Copied
→ Chart rendered; kernel state preserved (no re-import)
Export results
Save CSV + chart to ./out/ on host (this only).✓ Copied
→ Only that one path written; sandbox stays sealed
Outcome: Quick experiments without 'oops, it deleted /Users'.
Pitfalls
Network access still allowed in sandbox — Disable network if running truly untrusted code; otherwise it can exfiltrate