Run the shell directly on the host process.
This policy is best suited for trusted or single-tenant environments (CI jobs,
developer workstations, pre-sandboxed containers) where the agent must access the
host filesystem and tooling without additional isolation. Enforces optional CPU and
memory limits to prevent runaway commands but offers no filesystem or network
sandboxing; commands can modify anything the process user can reach.
On Linux platforms resource limits are applied with resource.prlimit after the
shell starts. On macOS, where prlimit is unavailable, limits are set in a
preexec_fn before exec. In both cases the shell runs in its own process group
so timeouts can terminate the full subtree.