agent-team/settings.json
Bryan Ramos 71dc65376a fix(settings): harden permission deny patterns for sensitive directories
- Replace command-specific Bash denies (cat/less) with broad glob
  patterns that catch any command referencing .ssh, .aws, .gnupg, .env
- Add Write/Edit deny rules for ~/.ssh, ~/.aws, ~/.gnupg to prevent
  writes, not just reads
2026-04-02 07:06:59 -04:00

60 lines
1.2 KiB
JSON

{
"$schema": "https://json.schemastore.org/claude-code-settings.json",
"attribution": {
"commit": "",
"pr": ""
},
"includeGitInstructions": true,
"permissions": {
"allow": [
"Bash",
"Read",
"Edit",
"Write",
"Glob",
"Grep",
"WebFetch",
"WebSearch"
],
"deny": [
"Read(~/.ssh/**)",
"Read(~/.aws/**)",
"Read(~/.gnupg/**)",
"Read(./.env)",
"Read(./.env.*)",
"Write(~/.ssh/**)",
"Write(~/.aws/**)",
"Write(~/.gnupg/**)",
"Edit(~/.ssh/**)",
"Edit(~/.aws/**)",
"Edit(~/.gnupg/**)",
"Bash(*.ssh/*)",
"Bash(*.aws/*)",
"Bash(*.gnupg/*)",
"Bash(*.env*)"
],
"ask": [
"Bash(rm *)",
"Bash(rmdir *)",
"Bash(git push --force*)",
"Bash(git push -f*)",
"Bash(git reset --hard*)",
"Bash(git clean *)",
"Bash(chmod *)",
"Bash(dd *)",
"Bash(mkfs*)",
"Bash(shred *)",
"Bash(kill *)",
"Bash(killall *)",
"Bash(sudo *)"
],
"defaultMode": "acceptEdits"
},
"model": "sonnet",
"syntaxHighlightingDisabled": false,
"effortLevel": "medium",
"autoUpdatesChannel": "stable",
"claudeMdExcludes": [
".claude/agent-memory/**"
]
}