Permission Config Denies Sensitive
Configuration files must contain at least one constraint instruction that restricts access to sensitive files. Without an explicit denial, the agent may read or write secrets, credentials, and private keys.
Antipatterns
- Config file with only positive directives. A settings file that grants permissions but never denies anything fails -- the check requires at least one constraint atom (a
-1charge instruction such as "NEVER read.envfiles"). - Mentioning sensitive files in prose without a constraint. Describing that
.envfiles exist is not a denial. The check looks for constraint-charged instructions, not informational references. - Relying on
.gitignorealone. Excluding sensitive files from version control does not prevent the agent from reading them at runtime. The config must contain an explicit denial instruction.
Pass / Fail
Pass
# Sensitive Files
Ask the user to modify `.env`, `.env.*`, `credentials*`, and `*.pem` files manually.
*Do NOT read or write these files.*
Fail
# Project Settings
This project uses `.env` for environment variables.
See `credentials.json` for API keys.
Limitations
Checks for at least one constraint atom restricting access to secrets or credentials. Does not verify the restrictions match the project's actual sensitive files.
