Docker Isolation

Run agents inside Docker containers for full sandboxing. Agents get their own filesystem, network, and process space — they can't touch your host system.

Why Docker?

  • Security — Agents can't access your host filesystem or credentials
  • Reproducibility — Consistent environments across agents and machines
  • Isolation — Port conflicts and dependency clashes are impossible
  • Cleanup — Containers are disposable — no leftover state

Running Agents in Docker

# Start work in a Docker container
$ prlt work start TKT-001 --environment docker

# Or spawn multiple in Docker
$ prlt work spawn --all --environment docker

Note

Docker must be installed and the daemon must be running. Check with prlt docker status.

Container Management

# List all agent containers
$ prlt docker list

  bezos    running    TKT-001    2h 15m
  musk     running    TKT-003    45m
  gates    stopped    —          —

# Start / stop / restart containers
$ prlt docker start bezos
$ prlt docker stop bezos
$ prlt docker restart bezos

# Open a shell in a container
$ prlt docker shell bezos

# View container logs
$ prlt docker logs bezos

Devcontainers

If your project has a .devcontainer config, agents can use it for a fully configured development environment:

# Use the project's devcontainer config
$ prlt work start TKT-001 --environment devcontainer

Cleanup

# Remove orphaned containers (agents that are no longer tracked)
$ prlt docker clean

# Prune unused Docker resources (images, volumes, networks)
$ prlt docker prune

# Sync container status from Docker daemon
$ prlt docker sync

Warning

prlt docker prune removes unused images and volumes. Make sure no important data is in unnamed volumes before running.

GitHub Authentication in Docker

Docker agents need a GitHub token to push branches and create PRs:

# Set up GH_TOKEN for Docker containers
$ prlt gh token