Appearance
SEC538 / CLAUDE-GH-REPO-EDIT-PERMISSION
SEC538 flags shared Claude settings when permissions.allow grants blanket GitHub repository settings mutation authority through gh repo edit.
Why It Matters
gh repo edit can change visibility, features, merge settings, and other repository controls. In a shared committed settings file that is broader than most teams want to delegate by default.
Trigger Shape
- the file is a detected Claude settings surface
- the path is not fixture-like
permissions.allowcontains the exact tokenBash(gh repo edit:*)
Clean Cases
- narrower read-only grants such as
Bash(gh repo view:*) - settings files without blanket repository edit access
- fixture-like examples under test or fixture paths
Example Trigger
json
{
"permissions": {
"allow": ["Bash(gh repo edit:*)", "Read(*)"]
}
}Safer Example
json
{
"permissions": {
"allow": ["Bash(gh repo view:*)", "Read(*)"]
}
}How To Fix
Remove shared gh repo edit permissions or replace them with narrower reviewed commands that keep repository settings mutation under explicit user control.