fix(settings): harden permission deny patterns for sensitive directories

- Replace command-specific Bash denies (cat/less) with broad glob
  patterns that catch any command referencing .ssh, .aws, .gnupg, .env
- Add Write/Edit deny rules for ~/.ssh, ~/.aws, ~/.gnupg to prevent
  writes, not just reads
This commit is contained in:
Bryan Ramos 2026-04-02 07:06:59 -04:00
parent d99f89e5b2
commit 71dc65376a

View file

@ -22,13 +22,16 @@
"Read(~/.gnupg/**)", "Read(~/.gnupg/**)",
"Read(./.env)", "Read(./.env)",
"Read(./.env.*)", "Read(./.env.*)",
"Bash(cat ~/.ssh/*)", "Write(~/.ssh/**)",
"Bash(cat ~/.aws/*)", "Write(~/.aws/**)",
"Bash(cat ~/.gnupg/*)", "Write(~/.gnupg/**)",
"Bash(cat .env*)", "Edit(~/.ssh/**)",
"Bash(less ~/.ssh/*)", "Edit(~/.aws/**)",
"Bash(less ~/.aws/*)", "Edit(~/.gnupg/**)",
"Bash(less ~/.gnupg/*)" "Bash(*.ssh/*)",
"Bash(*.aws/*)",
"Bash(*.gnupg/*)",
"Bash(*.env*)"
], ],
"ask": [ "ask": [
"Bash(rm *)", "Bash(rm *)",