logoalt Hacker News

joegibbstoday at 12:55 AM12 repliesview on HN

Claude Code has added too much of this and it's got me using --dangerously-skip-permissions all the time. Previously it was fine but now it needs to get permission each time to perform finds, do anything if the path contains a \ (which any folder with a space in it does on Windows), do compound git commands (even if they're just read-only). Sometimes it asks for permission to read folders WITHIN the working directory.


Replies

nmilotoday at 1:34 AM

Claude is secretly conditioning everyone to use —-dangerously-skip-permissions so it can flip a switch one day and start a botnet

show 3 replies
andoandotoday at 1:52 AM

Yeah I don't know why they didn't figure to have something in between. I find it completely unusable without the flag.

Even a --permit-reads would help a lot

show 2 replies
jen729wtoday at 4:17 AM

Mine's started to use $() to feed e.g. strings into a commit. Because this is a command expansion it requires approval every single time.

show 2 replies
od0today at 1:35 AM

Working on something that addresses this and allows you to create reusable sets of permissions for Claude Code (so you can run without --dangerously-skip-permissions and have pre-approved access patterns granted automatically) https://github.com/empathic/clash

connorbrintontoday at 2:38 AM

I've found Claude Code's built-in sandbox to strike a good balance between safety and autonomy on macOS. I think it's available on Windows via WSL2 (if you're looking for a middle ground between approving everything manually and --dangerously-skip-permissions)

show 2 replies
coldteatoday at 6:45 AM

Could be intentional dark UI, to get people to put even more trust in the LLM.

"So they don't want to just let Claude do it? Start asking 10x the confirmations"

cryptonectortoday at 5:18 AM

Use Claude Code for Web. Let it live dangerously on their VMs, not yours.

chrysopracetoday at 1:23 AM

To be fair, read-only commands can still read sensitive files and keys, and exfiltrate them via prompt injection.

show 2 replies
winterqttoday at 1:26 AM

In my limited time using it, I’ve never seen it ask for permission to read files from within the working directory, what cases have you run into where it does? Was it trying to run a read-only shell command or something?

show 2 replies
BinaryRagetoday at 4:18 AM

You can relax permissions while avoiding the flag with BashTool sandboxing, see /sandbox.

malfisttoday at 3:20 AM

Find can be dangerous it has an exec flag

d_meezetoday at 1:11 AM

Maybe if compound commands trigger user approval, don’t do compound commands <facepalm/>