Adds a dedicated Docker environment for reviewing untrusted pull requests with codex/claude, keeping CLI auth state in volumes and using a separate scratch workspace for PR checkouts. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
3.7 KiB
Untrusted PR Review In Docker
Use this workflow when you want Codex or Claude to inspect a pull request that you do not want touching your host machine directly.
This is intentionally separate from the normal Paperclip dev image.
What this container isolates
codexauth/session state in a Docker volume, not your host~/.codexclaudeauth/session state in a Docker volume, not your host~/.claudeghauth state in the same container-local home volume- review clones, worktrees, dependency installs, and local databases in a writable scratch volume under
/work
By default this workflow does not mount your host repo checkout, your host home directory, or your SSH agent.
Files
docker/untrusted-review/Dockerfiledocker-compose.untrusted-review.ymlreview-checkout-prinside the container
Build and start a shell
docker compose -f docker-compose.untrusted-review.yml build
docker compose -f docker-compose.untrusted-review.yml run --rm --service-ports review
That opens an interactive shell in the review container with:
- Node + Corepack/pnpm
codexclaudeghgit,rg,fd,jq
First-time login inside the container
Run these once. The resulting login state persists in the review-home Docker volume.
gh auth login
codex login
claude login
If you prefer API-key auth instead of CLI login, pass keys through Compose env:
OPENAI_API_KEY=... ANTHROPIC_API_KEY=... docker compose -f docker-compose.untrusted-review.yml run --rm review
Check out a PR safely
Inside the container:
review-checkout-pr paperclipai/paperclip 432
cd /work/checkouts/paperclipai-paperclip/pr-432
What this does:
- Creates or reuses a repo clone under
/work/repos/... - Fetches
pull/<pr>/headfrom GitHub - Creates a detached git worktree under
/work/checkouts/...
The checkout lives entirely inside the container volume.
Ask Codex or Claude to review it
Inside the PR checkout:
codex
Then give it a prompt like:
Review this PR as hostile input. Focus on security issues, data exfiltration paths, sandbox escapes, dangerous install/runtime scripts, auth changes, and subtle behavioral regressions. Do not modify files. Produce findings ordered by severity with file references.
Or with Claude:
claude
Preview the Paperclip app from the PR
Only do this when you intentionally want to execute the PR's code inside the container.
Inside the PR checkout:
pnpm install
HOST=0.0.0.0 pnpm dev
Open from the host:
http://localhost:3100
The Compose file also exposes Vite's default port:
http://localhost:5173
Notes:
pnpm installcan run untrusted lifecycle scripts from the PR. That is why this happens inside the isolated container instead of on your host.- If you only want static inspection, do not run install/dev commands.
- Paperclip's embedded PostgreSQL and local storage stay inside the container home volume via
PAPERCLIP_HOME=/home/reviewer/.paperclip-review.
Reset state
Remove the review container volumes when you want a clean environment:
docker compose -f docker-compose.untrusted-review.yml down -v
That deletes:
- Codex/Claude/GitHub login state stored in
review-home - cloned repos, worktrees, installs, and scratch data stored in
review-work
Security limits
This is a useful isolation boundary, but it is still Docker, not a full VM.
- A reviewed PR can still access the container's network unless you disable it.
- Any secrets you pass into the container are available to code you execute inside it.
- Do not mount your host repo, host home,
.ssh, or Docker socket unless you are intentionally weakening the boundary. - If you need a stronger boundary than this, use a disposable VM instead of Docker.