Appearance
SEC387 / CLAUDE-GIT-COMMIT-PERMISSION
SEC387 flags shared Claude settings when permissions.allow grants the exact token Bash(git commit:*).
Why It Matters
git commit creates repository history and can silently turn in-progress local edits into committed project state. Putting that authority into a shared AI policy makes history mutation easier to inherit than a narrower reviewed workflow.
Trigger Shape
The rule triggers only when all of these are true:
- the file is a detected Claude settings surface
- the path is not fixture-like
permissions.allowcontains the exact tokenBash(git commit:*)
Clean Cases
These stay clean:
- more specific command examples such as
Bash(git commit -m release) - unrelated Git permissions like
Bash(git status) - fixture-like examples under test or fixture paths
Example Trigger
json
{
"permissions": {
"allow": ["Bash(git commit:*)", "Read(*)"]
}
}Safer Example
json
{
"permissions": {
"allow": ["Bash(git status)", "Read(*)"]
}
}How To Fix
Remove shared Bash(git commit:*) permissions, or replace them with a narrower reviewed workflow that does not grant broad commit authority by default.