moai-cc-permission-mode — community moai-cc-permission-mode, Nora-LiveKit, community, ide skills, Claude Code, Cursor, Windsurf

v4.0.0
GitHub

About this Skill

Perfect for Security-Conscious AI Agents needing fine-grained access control and permission management LiveKit based platform for Nora

jg-chalk-io jg-chalk-io
[0]
[0]
Updated: 3/5/2026

Agent Capability Analysis

The moai-cc-permission-mode skill by jg-chalk-io is an open-source community AI agent skill for Claude Code and other IDE workflows, helping agents execute tasks with better context, repeatability, and domain-specific guidance.

Ideal Agent Persona

Perfect for Security-Conscious AI Agents needing fine-grained access control and permission management

Core Value

Empowers agents to enforce comprehensive permission policies, enabling secure and controlled automation in enterprise environments through a two-layer permission system, including allowedTools whitelisting and support for specific commands like Bash and file patterns such as Read and Edit

Capabilities Granted for moai-cc-permission-mode

Implementing role-based access control for tool execution
Configuring whitelisted patterns for read and edit operations
Enforcing Bash command restrictions for secure system operations

! Prerequisites & Limits

  • Requires Claude Code integration
  • Dependent on LiveKit based platform compatibility
Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

moai-cc-permission-mode

Install moai-cc-permission-mode, an AI agent skill for AI agent workflows and automation. Works with Claude Code, Cursor, and Windsurf with one-command setup.

SKILL.md
Readonly

Claude Code Permission Modes

Overview

Claude Code permission management provides fine-grained control over tool access, command execution, and system operations through comprehensive permission policies. Enables secure, controlled automation in enterprise environments.

Permission Architecture

Two-Layer Permission System

Layer 1: allowedTools (Whitelist)
  ├─ Read patterns: Read(**/*.{js,ts})
  ├─ Edit patterns: Edit(src/**)
  └─ Bash patterns: Bash(git:*), Bash(npm:*)

Layer 2: deniedTools (Blacklist Override)
  ├─ Secrets files: .env*, .aws/**, .vercel/**
  ├─ Destructive: rm -rf:*, sudo:*
  └─ Dangerous: chmod 777:*

Permission Modes

Define explicitly allowed tool patterns:

json
1{ 2 "permissions": { 3 "allowedTools": [ 4 "Read(**/*.{js,ts,json,md})", 5 "Edit(**/*.{js,ts})", 6 "Bash(git:*)", 7 "Bash(npm:*)", 8 "Bash(uv:*)", 9 "Bash(pytest:*)", 10 "Bash(mypy:*)" 11 ] 12 } 13}

Benefits:

  • Secure by default (deny unless explicitly allowed)
  • Clear audit trail
  • Easy to review
  • Enterprise-ready

Explicitly block dangerous operations:

json
1{ 2 "permissions": { 3 "deniedTools": [ 4 "Edit(/config/secrets.json)", 5 "Edit(.env*)", 6 "Edit(.aws/**)", 7 "Bash(rm -rf:*)", 8 "Bash(sudo:*)", 9 "Bash(chmod 777:*)" 10 ] 11 } 12}

Issues:

  • Requires knowing all dangerous patterns
  • New vulnerabilities not covered
  • Hard to maintain
  • Not enterprise-recommended

Tool Pattern Syntax

Read Operations

Read(glob_pattern)

Examples:
- Read(**/*.{js,ts})          # All JS/TS files recursively
- Read(.claude/**)            # All Claude files
- Read(docs/api/**/*.md)      # API documentation
- Read(config/production.json) # Specific file

Edit Operations

Edit(glob_pattern)

Examples:
- Edit(src/**/*.py)           # Source code only
- Edit(src/services/*.ts)     # Specific directory

Never Edit:

  • .env* files
  • .aws/ credentials
  • .vercel/ project config
  • secrets.json, credentials.json

Bash Commands

Bash(command:*)

Examples:
- Bash(git:*)                 # All git operations
- Bash(npm:*)                 # NPM package management
- Bash(uv:*)                  # UV (Python) operations
- Bash(pytest:*)              # Testing
- Bash(mypy:*)                # Type checking
- Bash(ruff:*)                # Python linting

Dangerous (Block):
- Bash(rm -rf:*)              # Recursive delete
- Bash(sudo:*)                # Superuser access
- Bash(chmod 777:*)           # Permission changes
- Bash(find.*-delete:*)       # File deletion

Security Patterns

Production-Grade Configuration

json
1{ 2 "permissions": { 3 "allowedTools": [ 4 "Read(**)", 5 "Edit(src/**)", 6 "Edit(tests/**)", 7 "Bash(git:*)", 8 "Bash(uv:*)", 9 "Bash(pytest:*)", 10 "Bash(mypy:*)", 11 "Bash(ruff:*)" 12 ], 13 "deniedTools": [ 14 "Edit(.*)", 15 "Edit(.env*)", 16 "Edit(.aws/**)", 17 "Edit(.vercel/**)", 18 "Bash(rm:*)", 19 "Bash(sudo:*)", 20 "Bash(chmod:*)" 21 ] 22 }, 23 "sandbox": { 24 "allowUnsandboxedCommands": false 25 } 26}

Sensitive Data Protection

Critical patterns to block:

json
1{ 2 "deniedTools": [ 3 "Edit(.env*)", 4 "Edit(.env.local)", 5 "Edit(.env.production)", 6 "Edit(.aws/**)", 7 "Edit(.aws/credentials)", 8 "Edit(.aws/config)", 9 "Edit(.vercel/**)", 10 "Edit(config/**/secrets.json)", 11 "Edit(**/*credentials*.json)", 12 "Edit(**/*password*.json)", 13 "Edit(**/*token*.json)" 14 ] 15}

Permission Validation

Always validate permission configurations:

bash
1# Check current settings 2cat .claude/settings.json | jq '.permissions' 3 4# Verify allowedTools patterns 5cat .claude/settings.json | jq '.permissions.allowedTools[]' 6 7# Verify deniedTools patterns 8cat .claude/settings.json | jq '.permissions.deniedTools[]' 9 10# Test specific operation 11# Try Read(test_file.md) → allowed? 12# Try Edit(.env) → denied? 13# Try Bash(git status) → allowed?

Best Practices

Security-First Approach

  • ✅ Use whitelist (allowedTools) instead of blacklist
  • ✅ Protect secrets files (.env*, .aws/, .vercel/)
  • ✅ Block destructive commands (rm -rf, sudo, chmod)
  • ✅ Enable sandbox mode
  • ✅ Regularly review permissions
  • ✅ Audit permission violations
  • ✅ Document permission decisions

Team Collaboration

  • ✅ Document permission changes in commit
  • ✅ Explain security rationale
  • ✅ Test with different roles
  • ✅ Keep audit log of changes

Common Patterns by Use Case

Development Environment

json
1{ 2 "allowedTools": [ 3 "Read(**)", 4 "Edit(src/**)", 5 "Edit(tests/**)", 6 "Edit(.claude/**)", 7 "Bash(git:*)", 8 "Bash(uv:*)", 9 "Bash(pytest:*)", 10 "Bash(mypy:*)", 11 "Bash(ruff:*)" 12 ], 13 "deniedTools": [ 14 "Edit(.env*)", 15 "Edit(.aws/**)", 16 "Bash(rm -rf:*)", 17 "Bash(sudo:*)" 18 ] 19}

CI/CD Pipeline

json
1{ 2 "allowedTools": [ 3 "Read(src/**)", 4 "Read(tests/**)", 5 "Read(.github/workflows/**)", 6 "Bash(git:*)", 7 "Bash(uv:*)", 8 "Bash(pytest:*)", 9 "Bash(mypy:*)" 10 ], 11 "deniedTools": [ 12 "Edit(**)", 13 "Bash(sudo:*)", 14 "Bash(rm:*)" 15 ] 16}

Read-Only Analysis

json
1{ 2 "allowedTools": [ 3 "Read(**)", 4 "Bash(git:log)", 5 "Bash(git:show)" 6 ], 7 "deniedTools": [ 8 "Edit(**)", 9 "Bash(git:push)", 10 "Bash(git:pull)" 11 ] 12}

TRUST 5 Compliance

  • Test-First: Permission patterns tested with actual Claude Code usage scenarios
  • Readable: Clear permission naming and organization, documented rationale
  • Unified: Consistent permission approach across all environments
  • Secured: Whitelist-based, blocking all dangerous operations
  • Trackable: Audit trail of permission modifications and changes
  • moai-cc-hooks - Hook execution for pre/post-tool validation
  • moai-core-env-security - Environment variable security
  • moai-cc-sandbox-isolation - Sandbox mode configuration

Last Updated: 2025-11-19 Version: 4.0.0 Enterprise Production Ready: Yes ✅ Maturity: Stable

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is moai-cc-permission-mode?

Perfect for Security-Conscious AI Agents needing fine-grained access control and permission management LiveKit based platform for Nora

How do I install moai-cc-permission-mode?

Run the command: npx killer-skills add jg-chalk-io/Nora-LiveKit/moai-cc-permission-mode. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for moai-cc-permission-mode?

Key use cases include: Implementing role-based access control for tool execution, Configuring whitelisted patterns for read and edit operations, Enforcing Bash command restrictions for secure system operations.

Which IDEs are compatible with moai-cc-permission-mode?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for moai-cc-permission-mode?

Requires Claude Code integration. Dependent on LiveKit based platform compatibility.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add jg-chalk-io/Nora-LiveKit/moai-cc-permission-mode. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use moai-cc-permission-mode immediately in the current project.

Related Skills

Looking for an alternative to moai-cc-permission-mode or another community skill for your workflow? Explore these related open-source skills.

View All

widget-generator

Logo of f
f

f.k.a. Awesome ChatGPT Prompts. Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.

149.6k
0
AI

flags

Logo of vercel
vercel

flags is a Next.js feature management skill that enables developers to efficiently add or modify framework feature flags, streamlining React application development.

138.4k
0
Browser

zustand

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
AI

data-fetching

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
AI