Product Thumbnail

InstaVM

Instant computers in isolated environments for AI agents

API
Developer Tools
Artificial Intelligence
Visit WebsiteSee on Product Hunt

Hunted bymanish kumarmanish kumar

The production control plane for AI agents. Run agents like production servers: isolated, observable, and controlled. Firecracker microVMs with sub-200ms boot.

Top comment

Hello all, We have built instant computers for AI Agents. Cybersecurity world is abuzz with Shai-Huluds and Copy-Fail like attacks. The effect gets multiplied when you take into account the amount AI agents getting created and deployed in production. InstaVM is cloud infrastructure for AI agents. It gives every agent a real computer to use with strong isolation guarantee. Along with fast hardware-isolated VMs, persistent volumes, secrets injected on the fly, controlled egress, and live debugging for agents to run safely in production. But what we have built is not just a sandbox. And sandboxes are not enough on its own to get a useful AI agent: - Agents need a VM that is fast (quick to spin, snapshot, terminate), secure, and can install any dependency without restrictions (a computer with sudo). - Volumes are needed for long-term memory that outlives ephemeral sandboxes and can reattach to another run. - Secrets cannot live on the same plane as the VM due to prompt injection risk. This is new to the agent deployment pattern. - Network egress needs to be controlled to prevent agents from calling domains they should not. - Granular observability of state changes (filesystem, network, execution) for debugging, audit, and compliance. Do not miss our CLI! (pip install instavm / npm install instavm) Add via skills for your AI agents - npx skills add instavm/skills

Comment highlights

Regarding resource allocation how granular can we get with CPU/memory limits per microVM via the control plane, and does it support auto scaling metrics if an agent gets caught in an expensive recursive loop?

The persistent volumes angle is underrated in this thread — most agent infra discussions focus on isolation and secrets but gloss over the memory problem. If an agent's volume can reattach to a new run, that raises an interesting question: how do you handle volume integrity after a compromised run? If a prompt-injected agent writes malicious state to a volume that then gets reattached to a clean run, the isolation guarantee at the VM level doesn't help. Is there snapshotting or rollback on volumes, or is the assumption that the orchestration layer handles what gets reattached and when?

Hey Manish, congrats on shipping 🎉

The line that stands out: "secrets cannot live on the same plane as the VM due to prompt injection risk." That is exactly the right instinct, and it is the part most agent infra gets wrong by treating secrets as just another env var inside the sandbox.

Building in an adjacent layer myself (security and permission control between agents and the apps they touch), so the question I keep circling: once secrets live off-plane, what does the agent actually hold at runtime? A short-lived scoped token per call, a broker reference it has to ask through, or does the VM get the real secret injected at execution time and the isolation is purely network-level? The distinction matters because controlled egress stops the agent from calling domains it should not, but it does not stop a prompt-injected agent from misusing a credential it legitimately holds for a domain it is allowed to reach.

Also curious where the skills system sits in the trust boundary, since npx skills add instavm/skills means third-party skill code runs inside that same isolated compute. Who vets what a skill can reach?

I am a huge fan and user of InstaVM. After having worked with other similar products the speed at which their sandbox starts is unlike any other solution and would recommend this to no end 🔥

About InstaVM on Product Hunt

Instant computers in isolated environments for AI agents

InstaVM launched on Product Hunt on May 21st, 2026 and earned 93 upvotes and 9 comments, placing #18 on the daily leaderboard. The production control plane for AI agents. Run agents like production servers: isolated, observable, and controlled. Firecracker microVMs with sub-200ms boot.

InstaVM was featured in API (98.2k followers), Developer Tools (512.7k followers) and Artificial Intelligence (469k followers) on Product Hunt. Together, these topics include over 173.4k products, making this a competitive space to launch in.

Who hunted InstaVM?

InstaVM was hunted by manish kumar. A “hunter” on Product Hunt is the community member who submits a product to the platform — uploading the images, the link, and tagging the makers behind it. Hunters typically write the first comment explaining why a product is worth attention, and their followers are notified the moment they post. Around 79% of featured launches on Product Hunt are self-hunted by their makers, but a well-known hunter still acts as a signal of quality to the rest of the community. See the full all-time top hunters leaderboard to discover who is shaping the Product Hunt ecosystem.

Want to see how InstaVM stacked up against nearby launches in real time? Check out the live launch dashboard for upvote speed charts, proximity comparisons, and more analytics.