local (no isolation), docker (container-level), and daytona (cloud VM). See Environments for full provider-specific configuration.
Network access control
For cloud sandboxes (Daytona), you can control outbound network access with thenetwork field in [sandbox.daytona]. Three modes are available: "allow_all" (default), "block", and { allow_list = ["..."] } for CIDR-based egress filtering.
Server defaults in settings.toml apply when a run config doesn’t specify network. Individual run configs can override the server default.
See Environments — Network access for syntax examples and the full reference.