Run untrusted code safely, at scale, with auditable control.
This platform executes user-submitted code inside sandboxed containers, routes workloads through an async queue, and enforces tenant-level controls for quotas, auth, and traceability.
This platform executes user-submitted code inside sandboxed containers, routes workloads through an async queue, and enforces tenant-level controls for quotas, auth, and traceability.
Validates jobs, enforces tenant auth/quotas/submit-burst limits, and rejects oversized payload abuse.
Consumes queued jobs, publishes PendingJobsCount metrics, and dispatches hardened runner tasks to ECS/Fargate.
Executes JavaScript/Python/Java with strict timeout/process/file limits and bounded output capture.
Redis stores queue state, quota counters, and append-only audit events for traceability.
Client posts code payload. API authenticates tenant and reserves quota atomically.
Job enters BullMQ queue; queue depth metrics inform auto-scaling.
Worker launches isolated runner task, with per-job resource constraints attached.
Result, duration, and audit events are persisted; tenant can poll status safely.
Submit a job to the real backend from this page. Use your tenant API key.
No results yet.
Run a job, then click "Analyze Latest".
Press "History".
Press "Audit".
Press "Load Quotas".
Tip: if auth fails, verify your `x-api-key` value for the deployed tenant.