@codemcp/ade 0.6.0 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -102,7 +102,7 @@ describe("opencodeWriter", () => {
102
102
  expect(defaultsAgent).toContain('grep: "allow"');
103
103
  expect(defaultsAgent).toContain('list: "allow"');
104
104
  expect(defaultsAgent).toContain('lsp: "allow"');
105
- expect(defaultsAgent).toContain('task: "deny"');
105
+ expect(defaultsAgent).toContain('task: "allow"');
106
106
  expect(defaultsAgent).toContain('skill: "deny"');
107
107
  expect(defaultsAgent).toContain('todoread: "deny"');
108
108
  expect(defaultsAgent).toContain('todowrite: "deny"');
@@ -110,7 +110,6 @@ describe("opencodeWriter", () => {
110
110
  expect(defaultsAgent).toContain('websearch: "ask"');
111
111
  expect(defaultsAgent).toContain('codesearch: "ask"');
112
112
  expect(defaultsAgent).toContain('external_directory: "ask"');
113
- expect(defaultsAgent).toContain('doom_loop: "deny"');
114
113
  expect(defaultsAgent).toContain('"grep *": "allow"');
115
114
  expect(defaultsAgent).toContain('"rm *": "deny"');
116
115
  expect(defaultsFrontmatter.permission).toMatchObject({
@@ -119,15 +118,14 @@ describe("opencodeWriter", () => {
119
118
  grep: "allow",
120
119
  list: "allow",
121
120
  lsp: "allow",
122
- task: "deny",
121
+ task: "allow",
123
122
  skill: "deny",
124
123
  todoread: "deny",
125
124
  todowrite: "deny",
126
125
  webfetch: "ask",
127
126
  websearch: "ask",
128
127
  codesearch: "ask",
129
- external_directory: "ask",
130
- doom_loop: "deny"
128
+ external_directory: "ask"
131
129
  });
132
130
  const defaultsPermission = defaultsFrontmatter.permission as {
133
131
  bash: Record<string, string>;
@@ -24,9 +24,9 @@ const APPLICABLE_TO_ALL: Record<string, PermissionRule> = {
24
24
  "*.env.example": "allow"
25
25
  },
26
26
  skill: "deny", //we're using an own skills-mcp
27
- todoread: "deny", //no agent-proprieatry todo tools
27
+ todoread: "deny", //no agent-proprietary todo tools
28
28
  todowrite: "deny",
29
- task: "deny",
29
+ task: "allow", //starts subagents
30
30
  lsp: "allow",
31
31
  glob: "allow",
32
32
  grep: "allow",
@@ -129,8 +129,7 @@ const SENSIBLE_DEFAULTS_RULES: Record<string, PermissionRule> = {
129
129
  "useradd *": "deny",
130
130
  "userdel *": "deny",
131
131
  "iptables *": "deny"
132
- },
133
- doom_loop: "deny"
132
+ }
134
133
  };
135
134
 
136
135
  const MAX_AUTONOMY_RULES: Record<string, PermissionRule> = {