Appearance
SEC385 / CLAUDE-GIT-PUSH-PERMISSION
SEC385 flags shared Claude settings when permissions.allow grants the exact token Bash(git push).
Why It Matters
git push is a high-impact mutation step. Granting it directly in a shared AI policy makes repository publication authority part of the default team config, which is harder to review and easier to cargo-cult than a narrower workflow.
Trigger Shape
The rule triggers only when all of these are true:
- the file is a detected Claude settings surface
- the path is not fixture-like
permissions.allowcontains the exact tokenBash(git push)
Clean Cases
These stay clean:
- more specific command examples such as
Bash(git push origin main) - unrelated Git permissions like
Bash(git status) - fixture-like examples under test or fixture paths
Example Trigger
json
{
"permissions": {
"allow": ["Bash(git push)", "Read(*)"]
}
}Safer Example
json
{
"permissions": {
"allow": ["Bash(git status)", "Read(*)"]
}
}How To Fix
Remove shared Bash(git push) permissions, or replace them with a narrower reviewed workflow that does not grant direct push authority by default.