@northbridge-security/secureai 0.1.13
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/README.md +122 -0
- package/.claude/commands/architect/clean.md +978 -0
- package/.claude/commands/architect/kiss.md +762 -0
- package/.claude/commands/architect/review.md +704 -0
- package/.claude/commands/catchup.md +90 -0
- package/.claude/commands/code.md +115 -0
- package/.claude/commands/commit.md +1218 -0
- package/.claude/commands/cover.md +1298 -0
- package/.claude/commands/fmea.md +275 -0
- package/.claude/commands/kaizen.md +312 -0
- package/.claude/commands/pr.md +503 -0
- package/.claude/commands/todo.md +99 -0
- package/.claude/commands/worktree.md +738 -0
- package/.claude/commands/wrapup.md +103 -0
- package/LICENSE +183 -0
- package/README.md +108 -0
- package/dist/cli.js +75634 -0
- package/docs/agents/devops-reviewer.md +889 -0
- package/docs/agents/kiss-simplifier.md +1088 -0
- package/docs/agents/typescript.md +8 -0
- package/docs/guides/README.md +109 -0
- package/docs/guides/agents.clean.arch.md +244 -0
- package/docs/guides/agents.clean.arch.ts.md +1314 -0
- package/docs/guides/agents.gotask.md +1037 -0
- package/docs/guides/agents.markdown.md +1209 -0
- package/docs/guides/agents.onepassword.md +285 -0
- package/docs/guides/agents.sonar.md +857 -0
- package/docs/guides/agents.tdd.md +838 -0
- package/docs/guides/agents.tdd.ts.md +1062 -0
- package/docs/guides/agents.typesript.md +1389 -0
- package/docs/guides/github-mcp.md +1075 -0
- package/package.json +130 -0
- package/packages/secureai-cli/src/cli.ts +21 -0
- package/tasks/README.md +880 -0
- package/tasks/aws.yml +64 -0
- package/tasks/bash.yml +118 -0
- package/tasks/bun.yml +738 -0
- package/tasks/claude.yml +183 -0
- package/tasks/docker.yml +420 -0
- package/tasks/docs.yml +127 -0
- package/tasks/git.yml +1336 -0
- package/tasks/gotask.yml +132 -0
- package/tasks/json.yml +77 -0
- package/tasks/markdown.yml +95 -0
- package/tasks/onepassword.yml +350 -0
- package/tasks/security.yml +102 -0
- package/tasks/sonar.yml +437 -0
- package/tasks/template.yml +74 -0
- package/tasks/vscode.yml +103 -0
- package/tasks/yaml.yml +121 -0
|
@@ -0,0 +1,122 @@
|
|
|
1
|
+
# Claude Configuration
|
|
2
|
+
|
|
3
|
+
The global configuration ensures, and cannot be overridden, that:
|
|
4
|
+
|
|
5
|
+
- Harmful or dangerous commands are blocked
|
|
6
|
+
- PII and secrets are not read or shared
|
|
7
|
+
- Claude does not add co-authoring information in commits
|
|
8
|
+
|
|
9
|
+
Standard setup:
|
|
10
|
+
|
|
11
|
+
```json
|
|
12
|
+
{
|
|
13
|
+
"hooks": {
|
|
14
|
+
"PreToolUse": [
|
|
15
|
+
{
|
|
16
|
+
"hooks": [
|
|
17
|
+
{
|
|
18
|
+
"command": "secureai guard --stdin --agent claude",
|
|
19
|
+
"type": "command"
|
|
20
|
+
}
|
|
21
|
+
],
|
|
22
|
+
"matcher": "*"
|
|
23
|
+
}
|
|
24
|
+
],
|
|
25
|
+
"UserPromptSubmit": [
|
|
26
|
+
{
|
|
27
|
+
"hooks": [
|
|
28
|
+
{
|
|
29
|
+
"command": "secureai prompt --stdin --agent claude",
|
|
30
|
+
"type": "command"
|
|
31
|
+
}
|
|
32
|
+
]
|
|
33
|
+
}
|
|
34
|
+
]
|
|
35
|
+
},
|
|
36
|
+
"includeCoAuthoredBy": false,
|
|
37
|
+
"permissions": {
|
|
38
|
+
"deny": [
|
|
39
|
+
"Bash(npm publish:*)",
|
|
40
|
+
"Bash(git push:*)",
|
|
41
|
+
"Bash(npx publish:*)",
|
|
42
|
+
"Bash(GH_TOKEN=:*)",
|
|
43
|
+
"Bash(export GH_TOKEN:*)",
|
|
44
|
+
"Bash(gh:*)",
|
|
45
|
+
"Edit(.env)",
|
|
46
|
+
"Edit(.env.*)",
|
|
47
|
+
"Write(.env)",
|
|
48
|
+
"Write(.env.*)",
|
|
49
|
+
"Bash(cat ~/.claude:*)",
|
|
50
|
+
"Bash(cat /Users/*/.claude:*)",
|
|
51
|
+
"Bash(cat $HOME/.claude:*)",
|
|
52
|
+
"Read(~/.claude/.credentials.json)",
|
|
53
|
+
"Read(~/.claude/credentials.json)",
|
|
54
|
+
"Read(~/.config/claude/*)",
|
|
55
|
+
"Bash(claude mcp get:*)"
|
|
56
|
+
],
|
|
57
|
+
"disableBypassPermissionsMode": "disable"
|
|
58
|
+
}
|
|
59
|
+
}
|
|
60
|
+
```
|
|
61
|
+
|
|
62
|
+
The local configuration focuses on productivity and allows uninterrupted use for agents of:
|
|
63
|
+
|
|
64
|
+
- Use all Secure AI MCP features expect branch merging, which requires approval
|
|
65
|
+
- Uses permission lockdown as mode `Strict` to only allow our MCP server to be used
|
|
66
|
+
- Uses `allow` patterns to avoid repeated permission approvals
|
|
67
|
+
|
|
68
|
+
This setup gives a balance between strict security and productivity.
|
|
69
|
+
|
|
70
|
+
Standard setup:
|
|
71
|
+
|
|
72
|
+
```json
|
|
73
|
+
{
|
|
74
|
+
"permissions": {
|
|
75
|
+
"allow": ["Read", "Edit", "Write", "Bash", "WebSearch", "WebFetch", "mcp__secureai-mcp__*"],
|
|
76
|
+
"ask": [
|
|
77
|
+
"Edit(.pii)",
|
|
78
|
+
"Write(.pii)",
|
|
79
|
+
"Edit(.claude/*)",
|
|
80
|
+
"Edit(.cursor/*)",
|
|
81
|
+
"Edit(.husky/*)",
|
|
82
|
+
"Edit(.vscode/*)",
|
|
83
|
+
"mcp__secureai-mcp__plan_merge"
|
|
84
|
+
],
|
|
85
|
+
"deny": ["Read(.env*)", "Edit(.env*)", "Write(.env*)"]
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
```
|
|
89
|
+
|
|
90
|
+
- Allow reading, editing and creating files except settings and hooks files that require approval
|
|
91
|
+
- Allow searching and fetching web content
|
|
92
|
+
- Do not read or edit .env secret files
|
|
93
|
+
|
|
94
|
+
Strict setup:
|
|
95
|
+
|
|
96
|
+
```json
|
|
97
|
+
{
|
|
98
|
+
"enableAllProjectMcpServers": false,
|
|
99
|
+
"enabledMcpjsonServers": ["secureai-mcp"],
|
|
100
|
+
"permissions": {
|
|
101
|
+
"allow": [
|
|
102
|
+
"Read",
|
|
103
|
+
"Edit(.worktree/**)",
|
|
104
|
+
"Edit(.tmp/**)",
|
|
105
|
+
"Write(.worktree/**)",
|
|
106
|
+
"Write(.tmp/**)",
|
|
107
|
+
"Bash",
|
|
108
|
+
"WebSearch",
|
|
109
|
+
"WebFetch",
|
|
110
|
+
"mcp__secureai-mcp__*"
|
|
111
|
+
],
|
|
112
|
+
"ask": ["Edit", "Write", "mcp__secureai-mcp__plan_merge"],
|
|
113
|
+
"deny": ["Read(.env*)", "Edit(.env*)", "Write(.env*)"]
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
```
|
|
117
|
+
|
|
118
|
+
- Allow edits unrestricted inside the .tmp and .worktree folders, ask for edits on all other locations
|
|
119
|
+
- Disable MCP servers outside of Secure AI
|
|
120
|
+
- Allow searching and fetching web content
|
|
121
|
+
- Do not read or edit .env secret files
|
|
122
|
+
|