From 0a74ef584f5e973e3b59e6ff5aca43116fa32c49 Mon Sep 17 00:00:00 2001 From: Maurice Heumann Date: Mon, 22 Dec 2025 07:55:55 +0100 Subject: [PATCH] Update README with sandbox execution warning Added a warning about sandbox execution limitations. --- README.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/README.md b/README.md index 71d18334..de84e400 100644 --- a/README.md +++ b/README.md @@ -16,6 +16,11 @@ Built in C++ and powered by the [Unicorn Engine](https://github.com/unicorn-engi Try it out: sogen.dev +
+ +> [!WARNING] +> Sogen tries to sandbox the execution. However, as it's still early in development, it's hard to guarantee perfect isolation. Caution is advised when analyzing malware. + ## Key Features * 🔄 __Syscall-Level Emulation__