Introduce a lightweight OS-level sandboxing alternative to OpenShell, as OpenShell's heavy infrastructure (Docker/OCI, k3s, gateway) creates significant operational overhead and is impractical for local development, CI, edge deployments, and developer workstations.
### Package agent-os-kernel ### Problem Statement toolkit's [OpenShell integration](docs/integrations/openshell.md) demonstrates OS-level isolation with application-level governance. However, OpenShell requires a lot of heavy infrastructure (Docker/OCI runtimes, k3s, gateway), which adds significant operational overhead and isn't always practical - especially for local development, CI pipelines, edge deployments, or developer workstation environments. It also limits itself to just a few target deployments - there is also only linux support (last time I checked) [nono](https://github.com/always-further/nono) is a popular capability-based sandboxing library and CLI that provides OS-enforced isolation using **kernel-native mechanisms** (Landlock on Linux, Seatbelt on macOS) -- no containers, no daemons, no infrastructure. It would slot into the same architectural position as OpenShell (providing the "walls") while the governance toolkit provides the "brain." , and could even be built