Appearance
SEC483 / CLAUDE-GIT-CHERRY-PICK-PERMISSION
SEC483 flags shared Claude settings when permissions.allow grants blanket git cherry-pick authority.
Why It Matters
git cherry-pick applies commits into the current branch and mutates history. Granting Bash(git cherry-pick:*) in shared Claude settings makes broad commit-application authority part of the default team policy.
Trigger Shape
The rule triggers only when all of these are true:
- the file is a detected Claude settings surface
- the path is not fixture-like
permissions.allowcontains the exact tokenBash(git cherry-pick:*)
Clean Cases
These stay clean:
- more specific commands such as
Bash(git cherry-pick abc1234) - settings files that do not grant blanket
git cherry-pick - fixture-like examples under test or fixture paths
Example Trigger
json
{
"permissions": {
"allow": ["Bash(git cherry-pick:*)", "Read(*)"]
}
}Safer Example
json
{
"permissions": {
"allow": ["Bash(git cherry-pick abc1234)", "Read(*)"]
}
}How To Fix
Remove shared git cherry-pick permissions or replace them with a narrower reviewed workflow that keeps commit application under explicit user control.