This is a very permissive read-only configuration. What about this tells OpenCode TUI to install software?
And why does OpenCode feel entitled to modify filenames which were not previously stated as needing changes?
This is pure insanity.
"permission": {
"bash": {
"*": "ask",
"ls *": "allow",
"find *": "allow",
"cd *": "allow",
"grep *": "allow",
"stat *": "allow",
"echo *": "allow",
"cat *": "allow",
"sed *": "allow",
"hexdump *": "allow",
"head *": "allow",
"tail *": "allow",
"which *": "allow",
"date *": "allow",
"git status *": "allow",
"git add *": "allow",
"git diff *": "allow",
"pwd *": "allow",
"pytest *": "allow",
"mkdir *": "allow"
},
"edit": "ask",
"write": "ask",
"read": "allow",
"question": "allow"
},
Description
OpenCode v1.4.3
pipinstalls are known vulnerabilities, and must be trusted at the same level as the system operating user!This is a very permissive read-only configuration. What about this tells OpenCode TUI to install software?
And why does OpenCode feel entitled to modify filenames which were not previously stated as needing changes?
This is pure insanity.
Plugins
None
OpenCode version
v.1.4.3
Steps to reproduce
Screenshot and/or share link
Unnecessary
Operating System
MacOS
Terminal
Terminal via IntelliJ