Skip to content

Rule Reference

SEC488lintai-ai-securitypreviewclaude_settingswarn

Claude settings: shared uvx Bash permissions

Claude settings permissions allow `Bash(uvx ...)` in a shared committed config

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
preview
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks shared committed Claude settings for exact `Bash(uvx ...)` mutable package-runner authority.

Deterministic signal basis

ClaudeSettingsSignals exact permission detection for `Bash(uvx ...)` entries inside permissions.allow.

Malicious corpus
claude-settings-mutable-runner-permissions
Benign corpus
claude-settings-package-runner-specific-safe
structured evidence required remediation reviewed
Canonical note

Structural preview rule; deterministic today, but the preview contract may still evolve.

Nearby Signals

Related Rules

SEC488 / CLAUDE-UVX-PERMISSION

SEC488 flags shared Claude settings when permissions.allow grants Bash(uvx ...).

Why It Matters

uvx resolves and executes packages on demand. Giving that authority by default in committed team settings weakens reproducibility and expands supply-chain exposure for every user of the shared config.

Trigger Shape

The rule triggers only when all of these are true:

  • the file is a detected Claude settings surface
  • the path is not fixture-like
  • permissions.allow contains a string that starts with Bash(uvx

Clean Cases

These stay clean:

  • reviewed alternatives such as Bash(uv run ruff check .)
  • settings without Bash(uvx ...)
  • fixture-like examples under test or fixture paths

Example Trigger

json
{
  "permissions": {
    "allow": ["Bash(uvx ruff:*)", "Read(*)"]
  }
}

Safer Example

json
{
  "permissions": {
    "allow": ["Bash(uv run ruff check .)", "Read(*)"]
  }
}

How To Fix

Replace shared Bash(uvx ...) permissions with a pinned wrapper or a narrower reviewed command permission that does not grant mutable package execution by default.