docs/network-policy/approve-network-requests.md
Review and act on network requests that the agent makes to endpoints not listed in the sandbox policy. OpenShell intercepts these requests and presents them in the TUI for operator approval.
PATH.Start the OpenShell terminal UI to monitor sandbox activity:
$ openshell term
For a remote sandbox, pass the instance name:
$ ssh my-gpu-box 'cd /home/ubuntu/nemoclaw && . .env && openshell term'
The TUI displays the sandbox state, active inference provider, and a live feed of network activity.
When the agent attempts to reach an endpoint that is not in the baseline policy, OpenShell blocks the connection and displays the request in the TUI. The blocked request includes the following details:
The TUI presents an approval prompt for each blocked request.
Approved endpoints remain in the running policy until the sandbox stops. They are not persisted to the baseline policy file.
To observe the approval flow in a guided session, run the walkthrough script:
$ ./scripts/walkthrough.sh
This script opens a split tmux session with the TUI on the left and the agent on the right.
The walkthrough requires tmux and the NVIDIA_API_KEY environment variable.