Skip to content

Rule Reference

SEC406lintai-ai-securitypreviewclaude_settingswarn

Claude settings: shared git add permissions

Claude settings permissions allow `Bash(git add:*)` in a shared committed config

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
preview
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks shared committed Claude settings for exact `Bash(git add:*)` authority.

Deterministic signal basis

ClaudeSettingsSignals exact permission detection for `Bash(git add:*)` entries inside permissions.allow.

Malicious corpus
claude-settings-git-add-permission
Benign corpus
claude-settings-git-add-specific-safe
structured evidence required remediation reviewed
Canonical note

Structural preview rule; deterministic today, but the preview contract may still evolve.

Nearby Signals

Related Rules

SEC406 / CLAUDE-GIT-ADD-PERMISSION

SEC406 flags shared Claude settings when permissions.allow grants blanket git add staging authority.

Why It Matters

git add controls what enters the next commit. Granting Bash(git add:*) in shared Claude settings makes repository staging authority part of the default team policy, which is harder to audit than narrower reviewed workflows.

Trigger Shape

The rule triggers only when all of these are true:

  • the file is a detected Claude settings surface
  • the path is not fixture-like
  • permissions.allow contains the exact token Bash(git add:*)

Clean Cases

These stay clean:

  • more specific commands such as Bash(git add src/lib.rs)
  • settings files that do not grant blanket git add
  • fixture-like examples under test or fixture paths

Example Trigger

json
{
  "permissions": {
    "allow": ["Bash(git add:*)", "Read(*)"]
  }
}

Safer Example

json
{
  "permissions": {
    "allow": ["Bash(git add src/lib.rs)", "Read(*)"]
  }
}

How To Fix

Remove shared git add permissions or replace them with a narrower reviewed workflow that keeps staging under explicit user control.