Smol Machines Launches: Portable Virtual Machines Featuring Sub-Second Cold Starts and Cross-Platform Isolation
Smol Machines has introduced smolvm, a new CLI tool designed to ship and run software with default isolation. The platform enables users to manage custom Linux virtual machines locally on macOS and Linux, boasting sub-second cold start times and elastic memory usage. A standout feature is the ability to pack stateful virtual machines into a single '.smolmachine' file for seamless rehydration across supported platforms. Designed for sandboxing untrusted code and creating portable executables, smolvm offers hardware-isolated boundaries for filesystem and network access. It allows developers to create persistent machines where installed packages survive restarts, or run ephemeral workloads that boot in under 200ms without requiring runtime downloads or complex dependency management.
Key Takeaways
- High-Speed Performance: Achieves sub-second cold starts, with some workloads booting in less than 200ms.
- Universal Portability: Supports packing stateful virtual machines into a single
.smolmachinefile or self-contained binaries for cross-platform use. - Security by Default: Provides hardware isolation for filesystem, network, and credentials, including granular network egress control.
- Elastic Resource Management: Features elastic memory usage and cross-platform compatibility for both macOS and Linux environments.
In-Depth Analysis
High-Performance Virtualization and Portability
Smol Machines introduces a CLI tool, smolvm, that redefines how developers interact with Linux virtual machines. By focusing on sub-second cold starts, the tool addresses a common friction point in virtualization: latency. The system is built to be cross-platform, functioning on both macOS and Linux, and utilizes elastic memory to optimize local resource consumption. Beyond mere execution, smolvm allows users to pack an entire stateful virtual machine into a single file format known as .smolmachine. This enables developers to rehydrate their specific environments on any supported platform without losing state or configuration.
Advanced Sandboxing and Security Controls
A primary use case for smolvm is the secure execution of untrusted code. By default, the tool enforces a strict hypervisor boundary that separates the host filesystem, network, and credentials from the guest environment. Network access is disabled by default, preventing untrusted programs from communicating externally. However, the tool provides sophisticated egress controls, allowing users to whitelist specific hosts (e.g., registry.npmjs.org) while blocking all other traffic. This makes it a robust solution for running potentially hazardous scripts or testing software in a controlled, hardware-isolated environment.
Streamlined Development and Deployment
For development workflows, smolvm offers two distinct paths: ephemeral and persistent. Ephemeral machines are cleaned up immediately after a command exits, making them ideal for quick tasks or CI/CD-like workloads. Conversely, persistent machines allow installed packages and configurations to survive restarts. Furthermore, the tool can transform workloads into self-contained binaries. By pre-baking all dependencies into the image, smolvm eliminates the need for runtime downloads or external version managers like pyenv or conda, ensuring that the software runs identically across different host systems.
Industry Impact
The launch of Smol Machines signifies a shift toward more granular and lightweight virtualization in the developer toolchain. By combining the isolation of a traditional VM with the speed and portability typically associated with containers or WebAssembly, smolvm bridges a gap for developers needing hardware-level security without the overhead of traditional virtualization. Its ability to create portable, self-contained binaries could simplify software distribution, particularly for complex environments where dependency hell is a frequent issue. Additionally, the sub-second boot time makes it a viable candidate for AI coding agents and automated sandboxing tasks where performance is critical.
Frequently Asked Questions
Question: How does smolvm handle network security for untrusted code?
By default, network access is turned off to prevent untrusted code from communicating with external servers. Users can selectively enable network access or use the --allow-host flag to restrict egress to specific, trusted domains only.
Question: What platforms are currently supported by smolvm?
Smolvm is a cross-platform CLI tool that currently supports macOS and Linux environments.
Question: Can I save the state of my virtual machine for use on another computer?
Yes. Smolvm allows you to pack a stateful virtual machine into a single .smolmachine file, which can then be rehydrated and run on any other supported platform while maintaining its state.

