Skip to main content
Cowork includes two built-in tools for reaching the web:
  • Web Search runs a search-engine query and returns ranked results.
  • Web Fetch retrieves the contents of a specific URL.
In Cowork on third-party (3P), both are subject to your configuration: search depends on your inference provider, and fetch is gated by the sandbox network allowlist. Web Search is a server-side tool executed by your inference provider, not by the desktop app. Availability depends on which provider you’ve configured:
ProviderWeb Search
Google Cloud Vertex AIAvailable
Azure FoundryAvailable
Amazon BedrockNot available
GatewayAvailable if your gateway implements Anthropic’s web_search server tool
Because the search runs on the provider’s infrastructure, queries and results travel over the same path as model inference and are subject to your provider’s data-handling terms. No additional firewall rules are needed beyond the inference endpoint itself. If your provider doesn’t support search, or you want to use a different search backend, deploy a search MCP server via managedMcpServers and disable the built-in tool (below).

Web Fetch

Web Fetch runs inside the Cowork sandbox VM on the user’s device. Every fetch is checked against the sandbox network allowlist before the request leaves the VM. By default, the sandbox can reach only your inference provider’s endpoint, so Web Fetch will fail for any other host unless you’ve allowed it. To permit fetches:
GoalSet coworkEgressAllowedHosts to
Allow specific domains["docs.example.com", "*.your-org.com"]
Allow all hosts (no sandbox filtering)["*"]
Block all fetches[] and add "WebFetch" to disabledBuiltinTools
Wildcards match one or more leading subdomain labels (*.example.com matches a.example.com and a.b.example.com, but not example.com).
coworkEgressAllowedHosts controls the sandbox boundary. Your perimeter firewall is a separate, outer layer, so a host allowed in the sandbox still won’t be reachable if your corporate network blocks it. See Telemetry and egress for the distinction.
The same allowlist governs other in-sandbox network activity (for example, curl or pip install from the agent’s shell), not just the Web Fetch tool.

Disabling web tools

To remove web tools entirely, add them to disabledBuiltinTools:
["WebSearch", "WebFetch"]
With both disabled and coworkEgressAllowedHosts empty, the agent has no path to the public internet from inside the sandbox. It can still read and write local files, run code against them, and call any MCP servers you’ve provisioned. See the Locked down profile.