fix(897): broaden Bash allowlist to wildcard to stop coders stalling on uncommon commands
The per-command allowlist (Bash(cargo:*), Bash(git:*), …) misses any tool
a coder agent reaches for outside the curated set — ./script/*, make, curl,
jq, docker, test, [, etc. Each miss hits prompt_permission, which auto-denies
on the sled because no listener holds perm_rx (the matrix bot lives in the
gateway). 1,377 such denies in the sled log over the past week, accounting
for most of the recent throughput slowdown.
Replace the curated list with a single Bash(:*) wildcard in:
- .claude/settings.json (project root, picked up on git worktree add)
- server/src/io/fs/scaffold/templates.rs (used only by huskies init when
no .claude/settings.json already exists)
Update scaffold/tests.rs to assert the wildcard rather than a fixed set
of patterns; the per-command gate offered no real safety in this trusted
single-user deployment, since the prompt was never going to reach a human
anyway (that's the bug).
Stopgap until story 898 lands the proper sled→gateway permission
forwarding — at which point the wildcard can be narrowed back if desired.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -70,31 +70,7 @@ setup wizard instructions and guide the user through it conversationally.\n";
|
||||
pub(super) const STORY_KIT_CLAUDE_SETTINGS: &str = r#"{
|
||||
"permissions": {
|
||||
"allow": [
|
||||
"Bash(cargo:*)",
|
||||
"Bash(git:*)",
|
||||
"Bash(ls:*)",
|
||||
"Bash(mkdir:*)",
|
||||
"Bash(mv:*)",
|
||||
"Bash(rm:*)",
|
||||
"Bash(touch:*)",
|
||||
"Bash(echo:*)",
|
||||
"Bash(pwd:*)",
|
||||
"Bash(grep:*)",
|
||||
"Bash(find:*)",
|
||||
"Bash(head:*)",
|
||||
"Bash(tail:*)",
|
||||
"Bash(wc:*)",
|
||||
"Bash(cat:*)",
|
||||
"Bash(python3:*)",
|
||||
"Bash(node:*)",
|
||||
"Bash(npm:*)",
|
||||
"Bash(which:*)",
|
||||
"Bash(sed:*)",
|
||||
"Bash(awk:*)",
|
||||
"Bash(rg:*)",
|
||||
"Bash(diff:*)",
|
||||
"Bash(sort:*)",
|
||||
"Bash(uniq:*)",
|
||||
"Bash(:*)",
|
||||
"Read",
|
||||
"Edit",
|
||||
"Write",
|
||||
|
||||
@@ -614,24 +614,13 @@ fn scaffold_story_kit_claude_settings_uses_canonical_bash_syntax() {
|
||||
);
|
||||
}
|
||||
|
||||
// Common safe commands must be allowlisted in canonical form.
|
||||
for required in &[
|
||||
r#""Bash(cargo:*)""#,
|
||||
r#""Bash(git:*)""#,
|
||||
r#""Bash(ls:*)""#,
|
||||
r#""Bash(cat:*)""#,
|
||||
r#""Bash(grep:*)""#,
|
||||
r#""Bash(find:*)""#,
|
||||
r#""Bash(python3:*)""#,
|
||||
r#""Bash(node:*)""#,
|
||||
r#""Bash(npm:*)""#,
|
||||
r#""Bash(rg:*)""#,
|
||||
r#""Bash(sed:*)""#,
|
||||
r#""Bash(awk:*)""#,
|
||||
] {
|
||||
assert!(
|
||||
settings.contains(required),
|
||||
"settings.json missing required allowlist pattern: {required}"
|
||||
);
|
||||
}
|
||||
// The wildcard `Bash(:*)` must be present — covers all bash commands.
|
||||
// (Previously this asserted a curated per-command list; replaced with a
|
||||
// single wildcard since coders kept hitting auto-deny on patterns the
|
||||
// list missed, and the per-command gate offers no real safety in this
|
||||
// trusted single-user deployment.)
|
||||
assert!(
|
||||
settings.contains(r#""Bash(:*)""#),
|
||||
"settings.json missing wildcard Bash allowlist: {settings}"
|
||||
);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user