@paulduvall/claude-dev-toolkit 0.0.1-alpha.13 โ 0.0.1-alpha.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +9 -9
- package/hooks/lib/argument-parser.sh +1 -1
- package/hooks/lib/context-manager.sh +1 -1
- package/hooks/lib/error-handler.sh +2 -2
- package/hooks/lib/execution-engine.sh +1 -1
- package/hooks/lib/execution-results.sh +1 -1
- package/hooks/lib/execution-simulation.sh +1 -1
- package/hooks/lib/field-validators.sh +1 -1
- package/hooks/lib/file-utils.sh +1 -1
- package/hooks/lib/subagent-discovery.sh +1 -1
- package/hooks/lib/subagent-validator.sh +1 -1
- package/hooks/lib/validation-reporter.sh +1 -1
- package/hooks/pre-commit-test-runner.sh +1 -1
- package/hooks/prevent-credential-exposure.sh +19 -15
- package/package.json +1 -1
- package/subagents/debug-specialist.md +1 -0
- package/templates/basic-settings.json +3 -17
- package/templates/comprehensive-settings.json +6 -47
- package/templates/security-focused-settings.json +4 -16
package/README.md
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
# Claude Dev Toolkit
|
|
2
2
|
|
|
3
|
-
**Transform Claude Code into a complete development platform** with
|
|
3
|
+
**Transform Claude Code into a complete development platform** with 62 AI-powered custom commands that automate your entire software development workflow.
|
|
4
4
|
|
|
5
5
|
## ๐ Quick Installation
|
|
6
6
|
|
|
@@ -15,8 +15,8 @@ claude
|
|
|
15
15
|
|
|
16
16
|
## ๐ฆ What's Included
|
|
17
17
|
|
|
18
|
-
- **
|
|
19
|
-
- **
|
|
18
|
+
- **16 Active Commands**: Production-ready commands for immediate use
|
|
19
|
+
- **46 Experimental Commands**: Cutting-edge features for early adopters
|
|
20
20
|
- **Security Hooks**: Automated security validation and governance
|
|
21
21
|
- **Configuration Templates**: Pre-configured settings for different workflows
|
|
22
22
|
- **Interactive Setup Wizard**: Guided installation with customization options
|
|
@@ -33,9 +33,9 @@ npm install -g @paulduvall/claude-dev-toolkit
|
|
|
33
33
|
### Option 2: Manual Command Installation
|
|
34
34
|
```bash
|
|
35
35
|
# Install specific command sets
|
|
36
|
-
claude-commands install --active # Install
|
|
37
|
-
claude-commands install --experiments # Install
|
|
38
|
-
claude-commands install --all # Install all
|
|
36
|
+
claude-commands install --active # Install 16 production commands
|
|
37
|
+
claude-commands install --experiments # Install 46 experimental commands
|
|
38
|
+
claude-commands install --all # Install all 62 commands
|
|
39
39
|
```
|
|
40
40
|
|
|
41
41
|
### Option 3: Custom Installation
|
|
@@ -68,7 +68,7 @@ claude-commands oidc --help # Configure GitHub Actions OIDC with AWS
|
|
|
68
68
|
- **`/xconfig`** - Configuration management
|
|
69
69
|
- **`/xtdd`** - Test-driven development automation
|
|
70
70
|
|
|
71
|
-
### ๐งช **Experimental Commands** (
|
|
71
|
+
### ๐งช **Experimental Commands** (46 Additional)
|
|
72
72
|
Advanced commands for specialized workflows:
|
|
73
73
|
- **Planning & Analytics**: `/xplanning`, `/xanalytics`, `/xmetrics`
|
|
74
74
|
- **Infrastructure**: `/xinfra`, `/xmonitoring`, `/xaws`
|
|
@@ -271,7 +271,7 @@ npm test
|
|
|
271
271
|
- โ
**Dependency Validation**: AWS CLI, Git, and GitHub CLI availability checking
|
|
272
272
|
|
|
273
273
|
### Version 0.0.1-alpha.8
|
|
274
|
-
- โ
**Documentation Consistency**: Fixed command counts
|
|
274
|
+
- โ
**Documentation Consistency**: Fixed command counts and subagent counts
|
|
275
275
|
- โ
**Test Infrastructure**: Enhanced test-results directory handling
|
|
276
276
|
- โ
**Repository Cleanup**: Removed outdated documentation and test artifacts
|
|
277
277
|
- โ
**Validation Logic**: Improved scenario-aware test validation
|
|
@@ -289,7 +289,7 @@ npm test
|
|
|
289
289
|
- โ
**JavaScript Migration**: Complete test suite migration from Python
|
|
290
290
|
- โ
**Enhanced Templates**: Fixed configuration template issues
|
|
291
291
|
- โ
**Test Suites**: Package structure and command validation
|
|
292
|
-
- โ
**
|
|
292
|
+
- โ
**62 Total Commands**: 16 active + 46 experimental commands
|
|
293
293
|
- โ
**Security Enhancements**: Comprehensive security hook system
|
|
294
294
|
|
|
295
295
|
## ๐ License
|
|
@@ -11,7 +11,7 @@ set -uo pipefail
|
|
|
11
11
|
_ARGUMENT_PARSER_LOADED=1
|
|
12
12
|
|
|
13
13
|
# Source required modules
|
|
14
|
-
SCRIPT_DIR="$
|
|
14
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
15
15
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
16
16
|
source "$SCRIPT_DIR/error-handler.sh"
|
|
17
17
|
|
|
@@ -11,7 +11,7 @@ set -uo pipefail
|
|
|
11
11
|
_CONTEXT_MANAGER_LOADED=1
|
|
12
12
|
|
|
13
13
|
# Source required modules
|
|
14
|
-
SCRIPT_DIR="$
|
|
14
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
15
15
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
16
16
|
source "$SCRIPT_DIR/file-utils.sh"
|
|
17
17
|
source "$SCRIPT_DIR/error-handler.sh"
|
|
@@ -11,7 +11,7 @@ set -uo pipefail
|
|
|
11
11
|
_ERROR_HANDLER_LOADED=1
|
|
12
12
|
|
|
13
13
|
# Source required modules
|
|
14
|
-
SCRIPT_DIR="$
|
|
14
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
15
15
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
16
16
|
source "$SCRIPT_DIR/file-utils.sh"
|
|
17
17
|
|
|
@@ -40,7 +40,7 @@ log_message() {
|
|
|
40
40
|
|
|
41
41
|
log_info() {
|
|
42
42
|
local message="$1"
|
|
43
|
-
log_message "INFO" "$message"
|
|
43
|
+
log_message "INFO" "$message" >&2
|
|
44
44
|
}
|
|
45
45
|
|
|
46
46
|
log_warning() {
|
|
@@ -11,7 +11,7 @@ set -uo pipefail
|
|
|
11
11
|
_EXECUTION_ENGINE_LOADED=1
|
|
12
12
|
|
|
13
13
|
# Source required modules
|
|
14
|
-
SCRIPT_DIR="$
|
|
14
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
15
15
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
16
16
|
source "$SCRIPT_DIR/file-utils.sh"
|
|
17
17
|
source "$SCRIPT_DIR/error-handler.sh"
|
|
@@ -12,7 +12,7 @@ set -uo pipefail
|
|
|
12
12
|
_EXECUTION_RESULTS_LOADED=1
|
|
13
13
|
|
|
14
14
|
# Source required modules
|
|
15
|
-
SCRIPT_DIR="$
|
|
15
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
16
16
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
17
17
|
source "$SCRIPT_DIR/file-utils.sh"
|
|
18
18
|
source "$SCRIPT_DIR/error-handler.sh"
|
|
@@ -11,7 +11,7 @@ set -uo pipefail
|
|
|
11
11
|
_EXECUTION_SIMULATION_LOADED=1
|
|
12
12
|
|
|
13
13
|
# Source required modules
|
|
14
|
-
SCRIPT_DIR="$
|
|
14
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
15
15
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
16
16
|
source "$SCRIPT_DIR/file-utils.sh"
|
|
17
17
|
source "$SCRIPT_DIR/error-handler.sh"
|
|
@@ -12,7 +12,7 @@ set -uo pipefail
|
|
|
12
12
|
_FIELD_VALIDATORS_LOADED=1
|
|
13
13
|
|
|
14
14
|
# Source required modules
|
|
15
|
-
SCRIPT_DIR="$
|
|
15
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
16
16
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
17
17
|
source "$SCRIPT_DIR/error-handler.sh"
|
|
18
18
|
|
package/hooks/lib/file-utils.sh
CHANGED
|
@@ -11,7 +11,7 @@ set -uo pipefail
|
|
|
11
11
|
_FILE_UTILS_LOADED=1
|
|
12
12
|
|
|
13
13
|
# Source required modules
|
|
14
|
-
SCRIPT_DIR="$
|
|
14
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
15
15
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
16
16
|
|
|
17
17
|
##################################
|
|
@@ -11,7 +11,7 @@ set -uo pipefail
|
|
|
11
11
|
_SUBAGENT_DISCOVERY_LOADED=1
|
|
12
12
|
|
|
13
13
|
# Source required modules
|
|
14
|
-
SCRIPT_DIR="$
|
|
14
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
15
15
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
16
16
|
source "$SCRIPT_DIR/file-utils.sh"
|
|
17
17
|
source "$SCRIPT_DIR/error-handler.sh"
|
|
@@ -11,7 +11,7 @@ set -uo pipefail
|
|
|
11
11
|
_SUBAGENT_VALIDATOR_LOADED=1
|
|
12
12
|
|
|
13
13
|
# Source required modules
|
|
14
|
-
SCRIPT_DIR="$
|
|
14
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
15
15
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
16
16
|
source "$SCRIPT_DIR/file-utils.sh"
|
|
17
17
|
source "$SCRIPT_DIR/error-handler.sh"
|
|
@@ -12,7 +12,7 @@ set -uo pipefail
|
|
|
12
12
|
_VALIDATION_REPORTER_LOADED=1
|
|
13
13
|
|
|
14
14
|
# Source required modules
|
|
15
|
-
SCRIPT_DIR="$
|
|
15
|
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
16
16
|
source "$SCRIPT_DIR/config-constants.sh"
|
|
17
17
|
source "$SCRIPT_DIR/error-handler.sh"
|
|
18
18
|
|
|
@@ -51,7 +51,7 @@ is_commit_command() {
|
|
|
51
51
|
# Framework Detection
|
|
52
52
|
##################################
|
|
53
53
|
detect_framework() {
|
|
54
|
-
if [[ -f "pytest.ini" ]] || [[ -f "pyproject.toml" ]] && grep -q '\[tool.pytest' pyproject.toml 2>/dev/null; then
|
|
54
|
+
if [[ -f "pytest.ini" ]] || { [[ -f "pyproject.toml" ]] && grep -q '\[tool.pytest' pyproject.toml 2>/dev/null; }; then
|
|
55
55
|
echo "pytest"
|
|
56
56
|
elif [[ -f "package.json" ]] && grep -q '"test"' package.json 2>/dev/null; then
|
|
57
57
|
if grep -qE '"(jest|vitest)' package.json 2>/dev/null; then
|
|
@@ -134,27 +134,31 @@ scan_file_content() {
|
|
|
134
134
|
return 0
|
|
135
135
|
fi
|
|
136
136
|
|
|
137
|
-
log
|
|
138
|
-
|
|
137
|
+
# Redirect log output to stderr so it doesn't pollute stdout
|
|
138
|
+
# (callers capture stdout via command substitution for the violation count)
|
|
139
|
+
log "Scanning file: $file_path" >&2
|
|
140
|
+
|
|
139
141
|
# Check each credential pattern
|
|
140
142
|
for pattern_name in "${!CREDENTIAL_PATTERNS[@]}"; do
|
|
141
143
|
local pattern="${CREDENTIAL_PATTERNS[$pattern_name]}"
|
|
142
|
-
|
|
143
|
-
if echo "$content" | grep -qiP "$pattern"; then
|
|
144
|
-
log_violation "$pattern_name detected in $file_path"
|
|
144
|
+
|
|
145
|
+
if echo "$content" | grep -qiP -e "$pattern"; then
|
|
146
|
+
log_violation "$pattern_name detected in $file_path" >&2
|
|
145
147
|
violations+=("$pattern_name")
|
|
146
|
-
|
|
148
|
+
|
|
147
149
|
# Extract the matched content for logging (but redact it)
|
|
148
|
-
local matched_line
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
150
|
+
local matched_line
|
|
151
|
+
matched_line=$(echo "$content" | grep -iP -e "$pattern" | head -1)
|
|
152
|
+
local redacted_line
|
|
153
|
+
redacted_line=$(echo "$matched_line" | sed 's/[a-zA-Z0-9+/=]\{10,\}/[REDACTED]/g')
|
|
154
|
+
|
|
155
|
+
log_violation "Pattern: $pattern_name, Line: $redacted_line" >&2
|
|
156
|
+
|
|
153
157
|
# Notify security team
|
|
154
158
|
notify_security_team "$pattern_name" "$file_path" "$redacted_line"
|
|
155
159
|
fi
|
|
156
160
|
done
|
|
157
|
-
|
|
161
|
+
|
|
158
162
|
# Return violation count
|
|
159
163
|
echo "${#violations[@]}"
|
|
160
164
|
}
|
|
@@ -165,13 +169,13 @@ check_environment_leakage() {
|
|
|
165
169
|
|
|
166
170
|
# Check for environment variable exposure patterns
|
|
167
171
|
if echo "$content" | grep -qiP 'process\.env\.[A-Z_]*(?:KEY|SECRET|PASSWORD|TOKEN)'; then
|
|
168
|
-
log_violation "Environment variable credential exposure detected"
|
|
172
|
+
log_violation "Environment variable credential exposure detected" >&2
|
|
169
173
|
((violations++))
|
|
170
174
|
fi
|
|
171
|
-
|
|
175
|
+
|
|
172
176
|
# Check for hardcoded production URLs with credentials
|
|
173
177
|
if echo "$content" | grep -qiP 'https?://[^:]+:[^@]+@[^/]+'; then
|
|
174
|
-
log_violation "URL with embedded credentials detected"
|
|
178
|
+
log_violation "URL with embedded credentials detected" >&2
|
|
175
179
|
((violations++))
|
|
176
180
|
fi
|
|
177
181
|
|
package/package.json
CHANGED
|
@@ -1,4 +1,5 @@
|
|
|
1
1
|
---
|
|
2
|
+
name: debug-specialist
|
|
2
3
|
description: "Specialized debugging assistant with expertise in root cause analysis, error interpretation, and systematic troubleshooting"
|
|
3
4
|
tags: ["debugging", "error-analysis", "troubleshooting", "performance"]
|
|
4
5
|
tools: ["Read", "Bash", "Grep", "Edit", "Glob"]
|
|
@@ -1,22 +1,14 @@
|
|
|
1
1
|
{
|
|
2
|
-
"// Basic Claude Code settings.json template": "Copy to ~/.claude/settings.json",
|
|
3
|
-
"// Based on official Claude Code documentation": "https://docs.anthropic.com/en/docs/claude-code/settings",
|
|
4
|
-
|
|
5
|
-
"// Core tool permissions (replaces invalid 'allowedTools')": "",
|
|
6
2
|
"permissions": {
|
|
7
3
|
"allow": [
|
|
8
|
-
"Edit(*)",
|
|
9
4
|
"Bash(*)",
|
|
10
5
|
"Read(*)",
|
|
6
|
+
"Edit(*)",
|
|
11
7
|
"Write(*)",
|
|
12
|
-
"MultiEdit(*)",
|
|
13
8
|
"Glob(*)",
|
|
14
|
-
"Grep(*)"
|
|
15
|
-
"LS(*)"
|
|
9
|
+
"Grep(*)"
|
|
16
10
|
]
|
|
17
11
|
},
|
|
18
|
-
|
|
19
|
-
"// Basic hooks configuration": "",
|
|
20
12
|
"hooks": {
|
|
21
13
|
"PreToolUse": [
|
|
22
14
|
{
|
|
@@ -30,15 +22,9 @@
|
|
|
30
22
|
}
|
|
31
23
|
]
|
|
32
24
|
},
|
|
33
|
-
|
|
34
|
-
"// Standard Claude Code environment variables": "",
|
|
35
25
|
"env": {
|
|
36
26
|
"DISABLE_TELEMETRY": "1"
|
|
37
27
|
},
|
|
38
|
-
|
|
39
|
-
"// Optional: Include Claude co-authorship in git commits": "",
|
|
40
28
|
"includeCoAuthoredBy": true,
|
|
41
|
-
|
|
42
|
-
"// Optional: Custom retention for chat transcripts (days)": "",
|
|
43
29
|
"cleanupPeriodDays": 30
|
|
44
|
-
}
|
|
30
|
+
}
|
|
@@ -1,25 +1,15 @@
|
|
|
1
1
|
{
|
|
2
|
-
"// Comprehensive Claude Code settings.json template": "Copy to ~/.claude/settings.json",
|
|
3
|
-
"// Based on official Claude Code documentation": "https://docs.anthropic.com/en/docs/claude-code/settings",
|
|
4
|
-
"// Includes all advanced features and hook events": "",
|
|
5
|
-
|
|
6
|
-
"// Comprehensive tool permissions": "",
|
|
7
2
|
"permissions": {
|
|
8
3
|
"allow": [
|
|
9
|
-
"Edit(*)",
|
|
10
4
|
"Bash(*)",
|
|
11
5
|
"Read(*)",
|
|
6
|
+
"Edit(*)",
|
|
12
7
|
"Write(*)",
|
|
13
|
-
"MultiEdit(*)",
|
|
14
8
|
"Glob(*)",
|
|
15
9
|
"Grep(*)",
|
|
16
|
-
"LS(*)",
|
|
17
|
-
"Task(*)",
|
|
18
10
|
"WebFetch(*)",
|
|
19
11
|
"WebSearch(*)",
|
|
20
|
-
"NotebookEdit(*)"
|
|
21
|
-
"BashOutput(*)",
|
|
22
|
-
"KillBash(*)"
|
|
12
|
+
"NotebookEdit(*)"
|
|
23
13
|
],
|
|
24
14
|
"ask": [
|
|
25
15
|
"Bash(sudo *)",
|
|
@@ -34,12 +24,10 @@
|
|
|
34
24
|
"Edit(/etc/passwd)"
|
|
35
25
|
]
|
|
36
26
|
},
|
|
37
|
-
|
|
38
|
-
"// Comprehensive hooks covering all supported events": "",
|
|
39
27
|
"hooks": {
|
|
40
28
|
"PreToolUse": [
|
|
41
29
|
{
|
|
42
|
-
"matcher": "Edit|Write
|
|
30
|
+
"matcher": "Edit|Write",
|
|
43
31
|
"hooks": [
|
|
44
32
|
{
|
|
45
33
|
"type": "command",
|
|
@@ -63,41 +51,12 @@
|
|
|
63
51
|
],
|
|
64
52
|
"PostToolUse": []
|
|
65
53
|
},
|
|
66
|
-
|
|
67
|
-
"// Standard Claude Code environment variables": "",
|
|
68
54
|
"env": {
|
|
69
|
-
"// DO NOT commit real API keys. Set via: export ANTHROPIC_API_KEY=sk-ant-...": "",
|
|
70
|
-
"ANTHROPIC_API_KEY": "${ANTHROPIC_API_KEY}",
|
|
71
55
|
"DISABLE_TELEMETRY": "1",
|
|
72
|
-
"ANTHROPIC_LOG": "info"
|
|
73
|
-
"CLAUDE_PROJECT_DIR": "."
|
|
56
|
+
"ANTHROPIC_LOG": "info"
|
|
74
57
|
},
|
|
75
|
-
|
|
76
|
-
"// Advanced Claude Code configuration": "",
|
|
77
58
|
"includeCoAuthoredBy": true,
|
|
78
59
|
"cleanupPeriodDays": 30,
|
|
79
|
-
"// Model options: claude-sonnet-4-6 (default), claude-opus-4-6 (most capable), claude-haiku-4-5-20251001 (fastest)": "",
|
|
80
60
|
"model": "claude-sonnet-4-6",
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
"enableAllProjectMcpServers": false,
|
|
84
|
-
"enabledMcpjsonServers": [
|
|
85
|
-
"approved-server-1",
|
|
86
|
-
"approved-server-2"
|
|
87
|
-
],
|
|
88
|
-
"disabledMcpjsonServers": [
|
|
89
|
-
"blocked-server-1"
|
|
90
|
-
],
|
|
91
|
-
|
|
92
|
-
"// Optional: Custom API key helper script": "",
|
|
93
|
-
"apiKeyHelper": "~/.claude/scripts/get-api-key.sh",
|
|
94
|
-
|
|
95
|
-
"// Optional: Force specific login method": "",
|
|
96
|
-
"forceLoginMethod": "api-key",
|
|
97
|
-
|
|
98
|
-
"// Optional: Custom status line configuration": "",
|
|
99
|
-
"statusLine": {
|
|
100
|
-
"enabled": true,
|
|
101
|
-
"format": "Claude Code - Project: {project} | Model: {model} | Tools: {tools_count}"
|
|
102
|
-
}
|
|
103
|
-
}
|
|
61
|
+
"enableAllProjectMcpServers": false
|
|
62
|
+
}
|
|
@@ -1,9 +1,4 @@
|
|
|
1
1
|
{
|
|
2
|
-
"// Security-focused Claude Code settings.json template": "Copy to ~/.claude/settings.json",
|
|
3
|
-
"// Based on official Claude Code documentation": "https://docs.anthropic.com/en/docs/claude-code/settings",
|
|
4
|
-
"// Includes comprehensive security controls and governance": "",
|
|
5
|
-
|
|
6
|
-
"// Restrictive tool permissions for security": "",
|
|
7
2
|
"permissions": {
|
|
8
3
|
"allow": [
|
|
9
4
|
"Read(*)",
|
|
@@ -16,7 +11,8 @@
|
|
|
16
11
|
"Bash(npm run *)",
|
|
17
12
|
"Bash(python -m *)",
|
|
18
13
|
"Bash(node *)",
|
|
19
|
-
"
|
|
14
|
+
"Glob(*)",
|
|
15
|
+
"Grep(*)"
|
|
20
16
|
],
|
|
21
17
|
"deny": [
|
|
22
18
|
"Bash(curl *)",
|
|
@@ -35,12 +31,10 @@
|
|
|
35
31
|
"Read(~/.ssh/id_*)"
|
|
36
32
|
]
|
|
37
33
|
},
|
|
38
|
-
|
|
39
|
-
"// Comprehensive security hooks": "",
|
|
40
34
|
"hooks": {
|
|
41
35
|
"PreToolUse": [
|
|
42
36
|
{
|
|
43
|
-
"matcher": "Edit|Write
|
|
37
|
+
"matcher": "Edit|Write",
|
|
44
38
|
"hooks": [
|
|
45
39
|
{
|
|
46
40
|
"type": "command",
|
|
@@ -63,17 +57,11 @@
|
|
|
63
57
|
}
|
|
64
58
|
]
|
|
65
59
|
},
|
|
66
|
-
|
|
67
|
-
"// Standard Claude Code environment variables": "",
|
|
68
60
|
"env": {
|
|
69
61
|
"DISABLE_TELEMETRY": "1",
|
|
70
62
|
"ANTHROPIC_LOG": "error"
|
|
71
63
|
},
|
|
72
|
-
|
|
73
|
-
"// Security-focused settings": "",
|
|
74
64
|
"includeCoAuthoredBy": false,
|
|
75
65
|
"cleanupPeriodDays": 7,
|
|
76
|
-
|
|
77
|
-
"// Disable auto-approval of MCP servers for security": "",
|
|
78
66
|
"enableAllProjectMcpServers": false
|
|
79
|
-
}
|
|
67
|
+
}
|