fix(897): broaden Bash allowlist to wildcard to stop coders stalling on uncommon commands

The per-command allowlist (Bash(cargo:*), Bash(git:*), …) misses any tool
a coder agent reaches for outside the curated set — ./script/*, make, curl,
jq, docker, test, [, etc. Each miss hits prompt_permission, which auto-denies
on the sled because no listener holds perm_rx (the matrix bot lives in the
gateway). 1,377 such denies in the sled log over the past week, accounting
for most of the recent throughput slowdown.

Replace the curated list with a single Bash(:*) wildcard in:
  - .claude/settings.json (project root, picked up on git worktree add)
  - server/src/io/fs/scaffold/templates.rs (used only by huskies init when
    no .claude/settings.json already exists)

Update scaffold/tests.rs to assert the wildcard rather than a fixed set
of patterns; the per-command gate offered no real safety in this trusted
single-user deployment, since the prompt was never going to reach a human
anyway (that's the bug).

Stopgap until story 898 lands the proper sled→gateway permission
forwarding — at which point the wildcard can be narrowed back if desired.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
Timmy
2026-05-08 15:14:03 +01:00
parent 5248e7ee21
commit 5b48f0d051
3 changed files with 11 additions and 70 deletions
+1 -25
View File
@@ -70,31 +70,7 @@ setup wizard instructions and guide the user through it conversationally.\n";
pub(super) const STORY_KIT_CLAUDE_SETTINGS: &str = r#"{
"permissions": {
"allow": [
"Bash(cargo:*)",
"Bash(git:*)",
"Bash(ls:*)",
"Bash(mkdir:*)",
"Bash(mv:*)",
"Bash(rm:*)",
"Bash(touch:*)",
"Bash(echo:*)",
"Bash(pwd:*)",
"Bash(grep:*)",
"Bash(find:*)",
"Bash(head:*)",
"Bash(tail:*)",
"Bash(wc:*)",
"Bash(cat:*)",
"Bash(python3:*)",
"Bash(node:*)",
"Bash(npm:*)",
"Bash(which:*)",
"Bash(sed:*)",
"Bash(awk:*)",
"Bash(rg:*)",
"Bash(diff:*)",
"Bash(sort:*)",
"Bash(uniq:*)",
"Bash(:*)",
"Read",
"Edit",
"Write",
+9 -20
View File
@@ -614,24 +614,13 @@ fn scaffold_story_kit_claude_settings_uses_canonical_bash_syntax() {
);
}
// Common safe commands must be allowlisted in canonical form.
for required in &[
r#""Bash(cargo:*)""#,
r#""Bash(git:*)""#,
r#""Bash(ls:*)""#,
r#""Bash(cat:*)""#,
r#""Bash(grep:*)""#,
r#""Bash(find:*)""#,
r#""Bash(python3:*)""#,
r#""Bash(node:*)""#,
r#""Bash(npm:*)""#,
r#""Bash(rg:*)""#,
r#""Bash(sed:*)""#,
r#""Bash(awk:*)""#,
] {
assert!(
settings.contains(required),
"settings.json missing required allowlist pattern: {required}"
);
}
// The wildcard `Bash(:*)` must be present — covers all bash commands.
// (Previously this asserted a curated per-command list; replaced with a
// single wildcard since coders kept hitting auto-deny on patterns the
// list missed, and the per-command gate offers no real safety in this
// trusted single-user deployment.)
assert!(
settings.contains(r#""Bash(:*)""#),
"settings.json missing wildcard Bash allowlist: {settings}"
);
}