Service-derived env vars in config.toml, Codex support for agent-send, and SSH environment improvements.
Service-Derived Environment Variables
Define environment variables in .amika/config.toml that automatically resolve to your sandbox service URLs and ports
Works alongside existing env var types (plaintext values and secret references) in the [env] section
Resolved variables are available in both command execution and SSH sessions
CLI v0.5.2
agent-send now supports Codex agents -- send tasks to Codex-powered sandboxes alongside Claude
Sandbox Improvements
Environment variables (injected, service-derived, and lifecycle) are now written to /etc/environment, making them available in SSH login, interactive, and non-interactive shell sessions
March 30 – April 13, 2026
MCP integrations, multi-agent support, auto-branch creation, CLI improvements, and more.
MCP Integrations
New Integrations page for connecting third-party tools to your sandboxes
Connect Sentry and Linear via OAuth — credentials are automatically configured in your sandbox environment
Manage integrations per-organization from the sidebar
Multi-Agent Support
Connect your own Codex credentials to use alongside Claude in sandboxes
Choose which agent credentials to use when creating a sandbox
Codex CLI is auto-configured in sandboxes when credentials are connected
Sandbox Improvements
Auto-branch creation: A new git branch is automatically created for each sandbox, with the option to override the generated name or use an existing branch
Searchable branch picker in the Create Sandbox dialog
CLI
agent-send now works over the API instead of SSH, with session management for ongoing conversations
Added ls shorthand for list commands (sandbox ls, service ls, volume ls, secret claude ls)
Added rm shorthand for secret claude delete
Added secret codex push, secret codex list, and secret codex delete commands for managing Codex secrets
Added --no-setup flag to sandbox create to skip running setup scripts
Sandbox list is now sorted by most recently created
Fixed shell prompt colors on light terminal backgrounds
Sandbox containers now include .bashrc alongside .zshrc
API
API errors now return structured JSON with consistent error codes
Non-existent API routes return a proper JSON 404 instead of HTML
OpenCode Credentials
Store and manage your OpenCode credentials from the Settings page
Credentials are securely resolved from the vault and injected into sandboxes on create and start
Bug Fixes and Improvements
Sandbox start and stop operations now return immediately with status polling in the background
If sandbox setup fails, the error is now surfaced directly in the UI
Improved sandbox detail page layout with refreshed icons and a proper 404 page
Improved error messages for agent-send authentication failures