Simple pricing for short-lived code execution

Disposable-exec is priced for AI tools and developer products that need a hosted sandbox runtime without building their own queue, worker, quota, and execution layer.

Free

$0 / month
For testing the API and validating basic integration.
  • 50 executions / month
  • Short-lived Python execution
  • Structured results
  • Basic API access
Get access
Best starting point

Starter

$9 / month
For small agents, automation flows, and early product integrations.
  • 3,000 executions / month
  • API key management
  • Quota enforcement
  • Hosted sandbox execution
Choose Starter

Pro

$29 / month
For production agent workflows and recurring automation usage.
  • 12,000 executions / month
  • Discounted higher-volume usage
  • Hosted execution API
  • Current best fit for regular product usage
Choose Pro

Scale

$99 / month
For teams with higher-frequency usage that still want a managed execution layer.
  • 40,000 executions / month
  • Higher-volume access
  • Best for team usage
  • Enterprise/custom later
Choose Scale

Important: Disposable-exec is built for short-lived Python execution. It is not intended for long-running jobs, persistent processes, or general cloud compute workloads.

Current model: higher tiers are discounted versus Starter, but pricing is still structured to avoid turning the API into a low-margin bulk execution channel.

Current feature direction: API keys, quota enforcement, subscription-aware access, queue + worker execution, structured results, and hosted Docker sandbox execution.

Acceptable Use

Disposable-exec is a hosted Python sandbox API designed for legitimate developer, AI workflow, and internal automation use cases.

Allowed use cases include:

  • Validating short-lived Python snippets
  • Testing internal automation logic
  • Running controlled AI-generated code in an isolated environment
  • Developer workflow sandboxing and structured output validation

Disallowed use cases include:

  • Malware, harmful code, or unauthorized access activity
  • Credential attacks, abuse, spam, or botting
  • Persistent hosting, background services, or long-running workloads
  • Proxying, anonymous relay use, or general-purpose compute resale
  • Scraping or automated activity that violates third-party terms

The service is restricted to short-lived, isolated execution with enforced limits on runtime, resources, and access controls.