By default, a sandbox can reach any public IP on the internet. The platform always blocks egress to private, link-local, and loopback ranges regardless of your allow rules. UseDocumentation Index
Fetch the complete documentation index at: https://docs.superserve.ai/llms.txt
Use this file to discover all available pages before exploring further.
network rules to narrow the allowlist further.
Allow specific destinations
allowOut / allow_out accepts a mix of CIDRs and domain patterns. Combine it with denyOut: ["0.0.0.0/0"] to build a strict allowlist - deny everything, then add exceptions.
Rule format
| Field | Accepts | Notes |
|---|---|---|
allowOut / allow_out | CIDRs + domains | Domains support wildcards (*.example.com). |
denyOut / deny_out | CIDRs only | Use 0.0.0.0/0 to deny the entire internet and rely on allowOut for exceptions. |