ACTIVE (processing requests) and STANDBY (idle). Unlike traditional sandbox infrastructure, Blaxel’s killer feature is fully managed lifecycle. Sandboxes resume from standby in under 25 milliseconds and automatically scale to zero after a few seconds of inactivity — such that you can leave sandboxes idle without paying for compute. Memory state is maintained even after scaling down, including the running processes and entire filesystem. For cost-effective long-term persistence, you can attach volumes to sandboxes.

Some examples of use cases include…
Some examples of use cases include…
- Code review agents that analyze repositories to detect the effects of changes. These agents run fully isolated compute environments for each tenant while keeping them snapshotted in standby between sessions, eliminating the need to clone the repo every time.
- Code generation agents that iterate in their own compute environments, and instantly render live application previews as human users build, step away, and log back in.
- Data analyst agents that execute adhoc data analysis workflows, generating scripts on-the-fly and running them securely against private files or data within an isolated, ZDR-compliant environment.
- Background agents that operate beyond their pre-configured tools. Each agent gets its own “personal computer” where it can autonomously install packages, execute custom scripts, store files, and adapt to new requirements securely. They can parallelize dozens of those personal computers.
Create a sandbox
Create a new sandbox using the Blaxel SDK by specifying a name, image to use, optional deployment region, and the ports to expose. Note that ports 80 (system), and 443 & 8080 (sandbox API) are reserved by Blaxel.Set up authentication to Blaxel
Set up authentication to Blaxel
The Blaxel SDK authenticates with your workspace using credentials from these sources, in priority order:
- when running on Blaxel, authentication is handled automatically
- variables in your .envfile (BL_WORKSPACEandBL_API_KEY, or see this page for other authentication options).
- environment variables from your machine
- configuration file created locally when you log in through Blaxel CLI (or deploy on Blaxel)
Images
The list of public images can be found here. To create a sandbox with one of those images, enter 
blaxel/{NAME}:latest (e.g. blaxel/nextjs:latest).Ports
The following ports are reserved by Blaxel’s system:- 443: This port hosts the main sandbox API and is exposed via HTTPS
- 80: Reserved for system operations
- 8080: Reserved for sandbox API functionality
ports parameter. This allows you to access these ports from outside the sandbox, typically to create a preview URL on them.
Regions
Select the region where you want to deploy your sandbox. If you don’t specify a region, Blaxel will automatically use a default region.Expiration date
Set time-to-live & expiration policies on a sandbox to automatically delete it based on specific conditions:- expire at a specific date using the expiresparameter.
- expire after a total maximum lifetime using the ttlparameter
- expire after a period of inactivity using the lifecycle.expirationPolicies/lifecycle.expiration_policiesparameter
This differs from the automatic standby (scale-to-zero) which happens to all sandboxes when inactive and where the memory and filesystem are snapshotted to be resumed instantly.
Lifecycle expirations policies also support types 
ttl-max-age and date: check out the API reference for a full documentation. You can combine multiple expiration policies: whichever condition is met first will trigger the action.s (seconds), m (minutes), h (hours), d (days), and w (weeks).
Retrieve an existing sandbox
To reconnect to an existing sandbox, simply provide its name:Complete code examples demonstrating all operations are available on Blaxel’s GitHub: in TypeScript and in Python.
Create if not exists
This helper function either retrieves an existing sandbox or creates a new one if it doesn’t exist. Blaxel first checks for an existing sandbox with the providedname and either retrieves it or creates a new one using your specified configuration.
Connect to a sandbox with a terminal
You can explore the contents of a sandbox with a terminal-like interface by running:
MCP server for a sandbox
Every sandbox is also exposed via an MCP server that allows agents to operate a sandbox using tool calls. The MCP server operates through WebSockets at the sandbox’s base URL:Tools available in the MCP server…
Tools available in the MCP server…
- Process management:
- processExecute- Execute a command.
- processGet- Get process information by identifier (PID or name).
- processGetLogs- Get logs for a specific process.
- processKill- Kill a specific process.
- processStop- Stop a specific process.
- processesList- List all running processes.
 
- Filesystem operations
- fsDeleteFileOrDirectory- Delete a file or directory.
- fsGetWorkingDirectory- Get the current working directory.
- fsListDirectory- List contents of a directory.
- fsReadFile- Read contents of a file.
- fsWriteFile- Create or update a file.
 
- Tools specialized for code generation AI:
- codegenEditFile- Propose and apply a targeted edit to a specified file, with instructions and partial contents. This tool uses MorphLLM for fast edits, and requires a Morph API key set as an environment variable when creating the sandbox.
- codegenCodebaseSearch- Find semantic code snippets from the codebase based on a natural language query.
- codegenFileSearch- Fast fuzzy filename search in the project.
- codegenGrepSearch- Run fast, exact regex/text searches on files for locating patterns or strings.
- codegenListDir- List contents of a directory in the project.
- codegenParallelApply- Plan and apply similar changes to multiple locations/files simultaneously.
- codegenReadFileRange- Read a specific range of lines in a file (max 250 lines at once).
- codegenReapply- Retry the application of the last edit, in case it previously failed.
 
Sandbox statuses
Blaxel sandboxes start fromstandby to active in under 25 milliseconds, and scale back down to standby after a few seconds of inactivity, maintaining their previous state after scaling down.
Here is the summary on the possible statuses for a sandbox:
- standby: The sandbox is created but is hibernating. Sandboxes transition from standby to active mode in approximately 25 ms.- Cost: You are not charged for CPU/memory while a sandbox is in standby mode. However, you are charged for the storage of the snapshot and/or the volumes.
 
- active: The sandbox is running and processing tasks. You are charged for active runtime. Sandboxes automatically return to standby mode after 1 second of inactivity.- Cost: You are charged for CPU/memory and storage while a sandbox is in active mode.
 
Best practices
Unlike traditional sandbox providers, Blaxel Sandboxes automatically scale up and down at near-instant speeds. As such, here are some recommended best practices:- If the end-user or agent is expected to continue a session soon, just leave the sandbox be. It will automatically suspend when the connection closes (= you will stop paying for compute runtime) and resume when reconnected.
- The definition of “soon” is at your discretion. It’s a tradeoff between instant resume times from standby mode (~25ms) and paying for the standby snapshot storage cost. As a rule of thumb, most customers keep sandboxes in standby for a few hours to a few days.
- Blaxel doesn’t limit how long a sandbox can stay in standby mode, but doesn’t guarantee data persistence. For guaranteed long-term data persistence, use volumes.
- If you persist data in a volume, you can delete the sandbox. To resume a session, you’ll need to re-create the sandbox (~2–4 seconds) and restart processes to restore the same state.
- For automatic cleanup, set TTLs when creating your sandbox to delete it after a set idle duration or maximum age.
- When you delete a sandbox, all data is immediately erased. If the sandbox was never in standby mode, Blaxel guarantees ZDR (zero data retention).
Processes and commands
Execute and manage processes in sandboxes.
File system operations
Manage directories and files in sandboxes.
Tools for AI codegen
Manage codebases with tools specifically designed for code generation.
Log streaming
Access logs generated in a sandbox.
Ports
Expose and connect to ports of a sandbox.
Preview in real-time
Render code in real-time via a direct preview URL.
Sessions
Manage temporary sessions to connect to sandboxes from a frontend client.
Volumes (private preview)
Attach volumes to sandboxes to persist files.
Templates
Create custom sandbox templates.
Sandbox API
Access the your sandbox with an HTTP REST API.

