You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(security): tune firewall to prioritize HITL 'Ask' over 'Deny' blocks
- Update security.ts to move all block patterns to ask status for better flow
- Bump version to 2.1.0
- Update README.md with missing config variables and documentation on HITL changes
- Adjust test suite to reflect 'ask' expectations
Copy file name to clipboardExpand all lines: README.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ The **10-Tier Security Firewall** was inspired by the cutting-edge research of *
32
32
***Network Exfiltration Block**: Prevents unauthorized data egress by blocking DNS-probing tools like `ping`, `dig`, `nslookup`, `nc`, and `wget`.
33
33
***Shell Escape Defense**: Detects and blocks common shell escape bypasses like `find -exec` and `strings`.
34
34
***Self-Modification Protection**: Locks core configuration files and the plugin's own source code from being modified by the agent.
35
-
***Safe-by-Default (HITL)**: All potentially dangerous tool executionsrequire explicit human confirmation. Auto-approval ("YOLO mode") is disabled unless the `PAI_I_AM_DANGEROUS=true` environment variable is set.
35
+
***Safe-by-Default (HITL)**: All potentially dangerous tool executions—including those matching the security firewall—require explicit human confirmation. The firewall has been tuned in v2.1.0 to prioritize human-in-the-loop (HITL) 'Ask' prompts over hard 'Deny' blocks to maintain agent flow. Auto-approval ("YOLO mode") is disabled unless the `PAI_I_AM_DANGEROUS=true` environment variable is set.
36
36
***Terminal Sanitization**: Automatically strips ANSI escape codes from all logged output to prevent terminal-based attacks and ensure clean history.
37
37
***Data Redaction**: Robustly masks secrets (AWS keys, GitHub tokens, Slack/Stripe/Google keys) in both logs and tool outputs.
38
38
@@ -47,9 +47,12 @@ The plugin centers around the `PAI_DIR` environment variable.
47
47
| Variable | Description | Default |
48
48
| :--- | :--- | :--- |
49
49
|`PAI_DIR`| Root directory for PAI skill and history |`$XDG_CONFIG_HOME/opencode`|
50
+
|`HISTORY_DIR`| Override directory for session logs |`$PAI_DIR/history`|
50
51
|`DA`| Name of your Digital Assistant |`PAI`|
51
52
|`ENGINEER_NAME`| Your name/identity |`Operator`|
52
53
|`DA_COLOR`| UI color theme for your DA |`blue`|
54
+
|`TIME_ZONE`| Timezone for log timestamps |`system`|
# Update Security section to mention HITL instead of Block
31
+
old_security="* **Safe-by-Default (HITL)**: All potentially dangerous tool executions require explicit human confirmation. Auto-approval (\"YOLO mode\") is disabled unless the `PAI_I_AM_DANGEROUS=true` environment variable is set."
32
+
new_security="* **Safe-by-Default (HITL)**: All potentially dangerous tool executions—including those matching the security firewall—require explicit human confirmation. The firewall has been tuned in v2.1.0 to prioritize human-in-the-loop (HITL) 'Ask' prompts over hard 'Deny' blocks to maintain agent flow. Auto-approval (\"YOLO mode\") is disabled unless the `PAI_I_AM_DANGEROUS=true` environment variable is set."
0 commit comments