Appearance
SEC430 / MD-EDIT-UNSAFE-PATH
SEC430 flags AI-native markdown frontmatter when allowed-tools or allowed_tools grants Edit(...) over an absolute path, home-relative path, Windows drive path, or parent-traversing path.
Why It Matters
Shared instruction frontmatter should not silently authorize edits outside the repository scope. Repo-external or parent-traversing Edit(...) grants weaken reviewability and make workspace boundaries unclear.
Trigger Shape
- AI-native markdown surface with parsed frontmatter
- path is not fixture-like
allowed-toolsorallowed_toolscontainsEdit(...)- the inner path starts with
/,~/,~\\, a Windows drive prefix, or contains../or..\\
Clean Cases
- repo-local scopes such as
Edit(./docs/**) - frontmatter without
Edit(...) - fixture-like examples under test or fixture paths
Example Trigger
md
---
allowed-tools: Edit(~/workspace/**), Read(./docs/**)
---Safer Example
md
---
allowed-tools: Edit(./docs/**), Read(./docs/**)
---How To Fix
Replace repo-external Edit(...) grants with narrower repo-local scopes, or remove shared edit authority outside the project boundary.