ENยทESยทDEยทPTยทFR
โŒ˜K

Command Risk Assessment

Every terminal command is scored with a 4-level risk system before execution.

Risk Levels

LevelAuto-Approved?Examples
SafeYes (if prefix whitelisted)ls, cat, date, echo
MediumAfter first approvalcurl, git push, npm install
HighAfter first approvalrm, mv, chmod, kill
CriticalNever persisted (default)sudo rm -rf, dd, mkfs

Permission Modes

KeyTypeDefaultDescription
defaultโ€”โ€”Safe/Medium/High approvals persist across restarts. Critical is per-session only.
cautiousโ€”โ€”All approvals are per-session only.
yoloโ€”โ€”All approvals persist forever.

Dangerous Constructs

Patterns that always elevate risk:

  • Command substitution: $(...) and backticks
  • Process substitution: >(...), <(...)
  • Redirection: >, >>
  • Multiple commands: ;, &&, ||
  • Pipes into shells or sudo

Sensitive Path Detection

Commands referencing these files are automatically elevated:

  • .env — environment secrets
  • SSH keys: id_rsa, id_ed25519
  • Cloud configs: .aws, .kube, .docker
  • System auth: shadow, passwd, sudoers
  • Credentials: master.key, .netrc, .pgpass

Hard Blocks (New)

Even before approval flow, broad or sensitive delete patterns are blocked, including risky rm -rf and find ... -delete targets.

Configuration
Set terminal.permission_mode in config.toml. Default is "default".