Document and expand test coverage of config file feature
This commit is contained in:
19
README.md
19
README.md
@@ -16,6 +16,25 @@ The threat model is prompt injection and accidental damage, not a determined att
|
||||
|
||||
**Not protected in blacklist mode:** arbitrary readable files outside the sensitive paths list, and D-Bus method calls (access control is daemon-side).
|
||||
|
||||
## Configuration file
|
||||
|
||||
Settings can be stored in a TOML config file at `$XDG_CONFIG_HOME/agent-sandbox/config.toml` (or pass `--config <path>`). Use `--no-config` to skip loading it. The config file accepts the same options as the corresponding CLI flags.
|
||||
|
||||
Top-level keys set defaults; `[profile.<name>]` sections define named presets selectable with `--profile <name>`. CLI flags always take highest precedence, followed by the active profile, then top-level defaults.
|
||||
|
||||
```toml
|
||||
# Global defaults
|
||||
whitelist = true
|
||||
no-net = true
|
||||
ro = ["~/.aws"]
|
||||
|
||||
# Named profile
|
||||
[profile.docker]
|
||||
blacklist = true
|
||||
rw = ["/var/run/docker.sock"]
|
||||
command = ["claude", "--dangerously-skip-permissions"]
|
||||
```
|
||||
|
||||
## Escape hatches
|
||||
|
||||
When the agent needs access to something the sandbox blocks, use `--rw` or `--ro`:
|
||||
|
||||
Reference in New Issue
Block a user