Skip to content

Rule Reference

SEC491lintai-ai-securitypreviewclaude_settingswarn

Claude settings: shared pipx run Bash permissions

Claude settings permissions allow `Bash(pipx run ...)` in a shared committed config

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
preview
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks shared committed Claude settings for exact `Bash(pipx run ...)` mutable package-runner authority.

Deterministic signal basis

ClaudeSettingsSignals exact permission detection for `Bash(pipx run ...)` entries inside permissions.allow.

Malicious corpus
claude-settings-mutable-runner-permissions
Benign corpus
claude-settings-package-runner-specific-safe
structured evidence required remediation reviewed
Canonical note

Structural preview rule; deterministic today, but the preview contract may still evolve.

Nearby Signals

Related Rules

SEC491 / CLAUDE-PIPX-RUN-PERMISSION

SEC491 flags shared Claude settings when permissions.allow grants Bash(pipx run ...).

Why It Matters

pipx run resolves and executes packages on demand. In shared Claude settings, that turns mutable package execution into a default team capability instead of an explicitly reviewed action.

Trigger Shape

The rule triggers only when all of these are true:

  • the file is a detected Claude settings surface
  • the path is not fixture-like
  • permissions.allow contains a string that starts with Bash(pipx run

Clean Cases

These stay clean:

  • reviewed alternatives such as Bash(python -m black src)
  • settings without Bash(pipx run ...)
  • fixture-like examples under test or fixture paths

Example Trigger

json
{
  "permissions": {
    "allow": ["Bash(pipx run black:*)", "Read(*)"]
  }
}

Safer Example

json
{
  "permissions": {
    "allow": ["Bash(python -m black src)", "Read(*)"]
  }
}

How To Fix

Replace shared Bash(pipx run ...) permissions with a pinned wrapper or a narrower reviewed command permission that does not grant mutable package execution by default.