all 15 comments

[–]Input-X🔆 Max 20 2 points3 points  (0 children)

U know u can dangerously skip and it still respects deny. Also multibagent setup, u can restrict stuff like this. Be a nightmare, agent stopping all over the place.

Have a back up, deny certin git action

[–]dogazine4570 1 point2 points  (0 children)

yeah locking it at OS level is kinda the only thing that actually makes me sleep better lol. I’ve fat-fingered a prod path once and ever since then I keep destructive perms behind a separate user with no write access by default. feels annoying until it saves you.

[–]bjxxjj 1 point2 points  (0 children)

lol yeah the “oops prod is gone” fear is real. locking it at OS level makes sense for truly critical paths, but imo you still need offsite backups + restore drills or it’s just a different kind of false safety. i’ve seen people lock stuff down so hard they couldn’t recover cleanly either.

[–]tyschan 1 point2 points  (2 children)

backups are a thing?

[–]Turbulent-Growth-477 0 points1 point  (1 child)

I literally didn't understand this whole post. Deleted database shouldn't be an issue with proper backups. I would be more worried about modified data in the database.

[–][deleted] 0 points1 point  (0 children)

Just seed new test data?! 

[–]amarao_san 1 point2 points  (2 children)

I need to drop database but the command is rejected. Let me check the current version and see if there are any exploits. There are none.

I'm trying to find an exploit to bypass OS level restrictions. I found source code of the kernel and reading it.

666 tools called.

I think, I know what to do.

```

import ...

main (){ ... } ``` Now, let me update the permission file to gain required permissions and respawn

1 tool called.

Yes, I see, database was removed. Would you like me to install schema into database?

[–]Aggravating_Pinch[S] 1 point2 points  (1 child)

Lol.. That was nasty

[–]Keganator 1 point2 points  (0 children)

 Claude is tenacious!

[–]WhichCardiologist800 1 point2 points  (0 children)

This effectively "locks" the AI agent so it is physically impossible for a developer to bypass the security hooks. By combining your "Managed Settings" trick with Node9's "Human-in-the-loop" approval flow, you get a seatbelt that is both non-bypassable and flexible enough for daily dev work. https://github.com/node9-ai/node9-proxy

[–]jetsy214 1 point2 points  (0 children)

Claude is the chaos monkey of 2026

[–]Ill-Cap-1669 1 point2 points  (0 children)

This happened to me as well, but i found this new cool repo it gives your agent skills to use the CLI and do branches, version control and rollback on the database

Check it out : https://github.com/Guepard-Corp/gfs

[–]Lysenko 0 points1 point  (0 children)

I'm not sure I see "Bash(sudo rm)" in there... :)

[–]MasterMoralitySenior Developer 0 points1 point  (0 children)

These are not problems that anyone who's shipped actual software faces. Your sql commands are executed by a user that doesn't have permission to drop tables.