[do not merge] add managed filesystem deny_read blocklist#12389
[do not merge] add managed filesystem deny_read blocklist#12389viyatb-oai wants to merge 25 commits intomainfrom
Conversation
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 5030b4fe71
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 4dd8a79798
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
|
Closing this pull request because it has had no updates for more than 14 days. If you plan to continue working on it, feel free to reopen or open a new PR. |
Summary
Implements a managed filesystem read blocklist (
deny_read) enforced fromrequirements.toml, with enforcement in both direct file tools and OS sandbox backends on macOS/Linux.This adds the path-policy foundation needed for cases like blocking reads of files without relying on command-pattern blocking.
requirements.tomlsupport for[permissions.filesystem].deny_read*/**glob support in manageddeny_read, expanded to concrete matches when config is loadedSandboxPolicy/ protocol / app-server schema plumbing fordeny_read_pathsread_file,list_dir,view_image,grep_filesoverlap guard)file-read*+ unlink hardening)--tmpfsfor dirs,/dev/nullfor files)deny_readis configuredImplementation notes
*/**.grep_filescurrently shells out torgoutside the sandboxed shell path, so this PR rejects overlapping search roots instead of post-filtering.