fix(settings): harden permission deny patterns for sensitive directories

- Replace command-specific Bash denies (cat/less) with broad glob
  patterns that catch any command referencing .ssh, .aws, .gnupg, .env
- Add Write/Edit deny rules for ~/.ssh, ~/.aws, ~/.gnupg to prevent
  writes, not just reads
This commit is contained in:
Bryan Ramos 2026-04-02 07:06:59 -04:00
parent d99f89e5b2
commit 71dc65376a

View file

@ -22,13 +22,16 @@
"Read(~/.gnupg/**)",
"Read(./.env)",
"Read(./.env.*)",
"Bash(cat ~/.ssh/*)",
"Bash(cat ~/.aws/*)",
"Bash(cat ~/.gnupg/*)",
"Bash(cat .env*)",
"Bash(less ~/.ssh/*)",
"Bash(less ~/.aws/*)",
"Bash(less ~/.gnupg/*)"
"Write(~/.ssh/**)",
"Write(~/.aws/**)",
"Write(~/.gnupg/**)",
"Edit(~/.ssh/**)",
"Edit(~/.aws/**)",
"Edit(~/.gnupg/**)",
"Bash(*.ssh/*)",
"Bash(*.aws/*)",
"Bash(*.gnupg/*)",
"Bash(*.env*)"
],
"ask": [
"Bash(rm *)",