Appearance
Why It Matters
SEC375 flags committed Claude settings files when permissions.allow contains the exact wildcard discovery grant Glob(*).
This is useful because:
Glob(*)grants broad file-discovery capability instead of a reviewed scoped pattern set- shared Claude settings often become team-wide defaults by copy/paste
- broad file-discovery access is harder to defend in code review when a workflow only needs narrow, documented discovery scopes
Trigger Shape
- artifact kind is committed Claude settings
permissions.allowcontains the exact stringGlob(*)- file is not under a fixture-like path
Clean Cases
- scoped patterns like
Glob(./docs/**) - fixture/test/example copies
- unrelated markdown or non-Claude config files
Example Trigger
json
{
"permissions": {
"allow": ["Glob(*)", "Read(*)"]
}
}Safer Example
json
{
"permissions": {
"allow": ["Glob(./docs/**)", "Read(./docs/**)"]
}
}How To Fix
- replace
Glob(*)with specific reviewed glob scopes - remove broad file-discovery access from the shared Claude settings file if it is not required