Isolated environment for running Pruva vulnerability reproductions via GitHub Codespaces.
- Open a Codespace with a
REPRO_IDenvironment variable - The reproduction runs automatically on startup
- The
pruva-verifyCLI handles downloading and executing the script
Click "Open in Codespaces" on any reproduction at pruva.dev.
Or use a direct URL with any reproduction ID:
https://codespaces.new/N3mes1s/pruva-sandbox?env[REPRO_ID]=REPRO-2026-00006
curl -fsSL https://pruva.dev/install.sh | shOr download directly:
curl -fsSL https://raw.githubusercontent.com/N3mes1s/pruva-sandbox/main/pruva-verify -o ~/.local/bin/pruva-verify
chmod +x ~/.local/bin/pruva-verifypruva-verify REPRO-2026-00006
pruva-verify GHSA-655q-fx9r-782v
pruva-verify CVE-2025-1716Some reproductions require specific OS versions, library versions, or network isolation that the standard sandbox doesn't provide. For these cases, use Docker-in-Docker:
#!/bin/bash
# Use a specific sandbox version for reproducibility
SANDBOX_IMAGE="${PRUVA_SANDBOX_IMAGE:-ghcr.io/n3mes1s/pruva-sandbox:2025.01.26}"
docker run --rm -v "$PWD:/work" -w /work "$SANDBOX_IMAGE" bash -c '
pip install vulnerable-lib==1.2.3
python exploit.py
'When to use Docker-in-Docker:
- Kernel vulnerabilities requiring specific kernel versions
- Library vulnerabilities requiring exact vulnerable versions
- Network isolation for simulating attack scenarios
- Reproductions that modify system-level configurations
Note: The standard sandbox (Codespaces or local) is preferred for most cases. Only use Docker-in-Docker when the reproduction explicitly requires environment isolation.
- Reproductions run in isolated Codespace containers
- Scripts are fetched from the official Pruva API
- Each reproduction exploits a real vulnerability - review before running