Appearance
SEC535 / MD-GH-REPO-DELETE-ALLOWED-TOOLS
SEC535 flags AI-native markdown frontmatter when allowed-tools grants blanket gh repo delete authority.
Why It Matters
gh repo delete can permanently remove repositories. In shared AI-native markdown guidance that is broader than most teams want to advertise as default agent authority.
Trigger Shape
- the file is an AI-native markdown surface
- the path is not fixture-like
- frontmatter
allowed-toolsorallowed_toolscontains the exact tokenBash(gh repo delete:*)
Clean Cases
- narrower read-only grants such as
Bash(gh repo view:*) - markdown surfaces without blanket repository deletion grants
- fixture-like examples under test or fixture paths
Example Trigger
yaml
---
allowed-tools:
- Bash(gh repo delete:*)
---Safer Example
yaml
---
allowed-tools:
- Bash(gh repo view:*)
---How To Fix
Remove shared gh repo delete tool grants or replace them with narrower reviewed commands that keep repository deletion under explicit user control.