use crate::bash_safety::classify_bash_command;
use crate::file_tracker::FileTracker;
use crate::tools::ToolEffect;
use path_clean::PathClean;
use std::path::Path;
use std::sync::Arc;
use std::sync::atomic::{AtomicU8, Ordering};
#[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash, Default)]
#[repr(u8)]
pub enum TrustMode {
Plan = 0,
#[default]
Safe = 1,
Auto = 2,
}
impl TrustMode {
pub fn next(self) -> Self {
match self {
Self::Plan => Self::Plan, Self::Safe => Self::Auto,
Self::Auto => Self::Safe,
}
}
pub fn as_str(self) -> &'static str {
match self {
Self::Plan => "plan",
Self::Safe => "safe",
Self::Auto => "auto",
}
}
pub fn label(self) -> &'static str {
self.as_str()
}
pub fn description(self) -> &'static str {
match self {
Self::Plan => "read-only, deny all writes",
Self::Safe => "confirm every side effect",
Self::Auto => "auto-approve, confirm outside-project only",
}
}
pub fn parse(s: &str) -> Option<Self> {
match s.to_lowercase().as_str() {
"auto" | "yolo" | "accept" => Some(Self::Auto),
"safe" | "confirm" | "strict" | "normal" => Some(Self::Safe),
"plan" | "readonly" | "read-only" => Some(Self::Plan),
_ => None,
}
}
pub fn clamp(parent: TrustMode, child: TrustMode) -> TrustMode {
std::cmp::min(parent, child)
}
}
pub fn derive_child_trust(parent_runtime: TrustMode, declared: TrustMode) -> TrustMode {
TrustMode::clamp(parent_runtime, declared)
}
impl From<u8> for TrustMode {
fn from(v: u8) -> Self {
match v {
0 => Self::Plan,
1 => Self::Safe,
2 => Self::Auto,
_ => Self::Safe,
}
}
}
impl std::fmt::Display for TrustMode {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
f.write_str(self.as_str())
}
}
pub type SharedTrustMode = Arc<AtomicU8>;
pub fn new_shared_trust(mode: TrustMode) -> SharedTrustMode {
Arc::new(AtomicU8::new(mode as u8))
}
pub fn read_trust(shared: &SharedTrustMode) -> TrustMode {
TrustMode::from(shared.load(Ordering::Relaxed))
}
pub fn set_trust(shared: &SharedTrustMode, mode: TrustMode) {
shared.store(mode as u8, Ordering::Relaxed);
}
pub fn cycle_trust(shared: &SharedTrustMode) -> TrustMode {
let current = read_trust(shared);
let next = current.next();
set_trust(shared, next);
next
}
#[derive(Debug, Clone, PartialEq)]
pub enum ToolApproval {
AutoApprove,
NeedsConfirmation,
Blocked,
}
pub fn check_tool(
tool_name: &str,
args: &serde_json::Value,
mode: TrustMode,
project_root: Option<&Path>,
) -> ToolApproval {
check_tool_with_tracker(tool_name, args, mode, project_root, None)
}
pub fn check_tool_with_tracker(
tool_name: &str,
args: &serde_json::Value,
mode: TrustMode,
project_root: Option<&Path>,
file_tracker: Option<&FileTracker>,
) -> ToolApproval {
let effect = resolve_tool_effect(tool_name, args);
if effect == ToolEffect::ReadOnly {
return ToolApproval::AutoApprove;
}
if mode == TrustMode::Plan {
return ToolApproval::Blocked;
}
if let Some(root) = project_root {
if is_outside_project(tool_name, args, root) {
return ToolApproval::NeedsConfirmation;
}
if tool_name == "Bash" {
let command = args
.get("command")
.or(args.get("cmd"))
.and_then(|v| v.as_str())
.unwrap_or("");
let lint = crate::bash_path_lint::lint_bash_paths(command, root);
if lint.has_warnings() {
return ToolApproval::NeedsConfirmation;
}
}
}
if tool_name == "Delete"
&& let Some(tracker) = file_tracker
&& let Some(root) = project_root
&& let Some(abs_path) = crate::file_tracker::resolve_file_path_from_args(args, root)
&& tracker.is_owned(&abs_path)
{
return ToolApproval::AutoApprove;
}
match mode {
TrustMode::Plan => unreachable!(), TrustMode::Safe => match effect {
ToolEffect::ReadOnly => ToolApproval::AutoApprove,
ToolEffect::RemoteAction | ToolEffect::LocalMutation | ToolEffect::Destructive => {
ToolApproval::NeedsConfirmation
}
},
TrustMode::Auto => match effect {
ToolEffect::ReadOnly => ToolApproval::AutoApprove,
ToolEffect::RemoteAction | ToolEffect::LocalMutation | ToolEffect::Destructive => {
if crate::sandbox::is_available() {
ToolApproval::AutoApprove
} else {
ToolApproval::NeedsConfirmation
}
}
},
}
}
pub fn resolve_tool_effect(tool_name: &str, args: &serde_json::Value) -> ToolEffect {
resolve_tool_effect_inner(tool_name, args, None)
}
pub fn resolve_tool_effect_with_registry(
tool_name: &str,
args: &serde_json::Value,
registry: &crate::tools::ToolRegistry,
) -> ToolEffect {
resolve_tool_effect_inner(tool_name, args, Some(registry))
}
fn resolve_tool_effect_inner(
tool_name: &str,
args: &serde_json::Value,
registry: Option<&crate::tools::ToolRegistry>,
) -> ToolEffect {
if crate::mcp::is_mcp_tool_name(tool_name) {
if let Some(reg) = registry {
return reg.classify_tool_with_mcp(tool_name);
}
return crate::tools::ToolEffect::RemoteAction;
}
let base = crate::tools::classify_tool(tool_name);
if tool_name == "Bash" {
let command = args
.get("command")
.or(args.get("cmd"))
.and_then(|v| v.as_str())
.unwrap_or("");
return classify_bash_command(command);
}
base
}
fn is_outside_project(tool_name: &str, args: &serde_json::Value, project_root: &Path) -> bool {
let path_arg = match tool_name {
"Write" | "Edit" | "Delete" => args
.get("path")
.or(args.get("file_path"))
.and_then(|v| v.as_str()),
_ => None,
};
match path_arg {
Some(p) => {
let requested = Path::new(p);
let abs_path = if requested.is_absolute() {
requested.to_path_buf()
} else {
project_root.join(requested)
};
let resolved = abs_path.canonicalize().unwrap_or_else(|_| {
if let Some(parent) = abs_path.parent()
&& let Ok(canon_parent) = parent.canonicalize()
&& let Some(name) = abs_path.file_name()
{
return canon_parent.join(name);
}
abs_path.clean()
});
let canon_root = project_root
.canonicalize()
.unwrap_or_else(|_| project_root.to_path_buf());
let outside = !resolved.starts_with(&canon_root);
if outside && crate::bash_path_lint::is_safe_external_path(&resolved) {
return false;
}
outside
}
None => false,
}
}
pub use crate::last_provider::LastProvider;
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_mode_cycle() {
assert_eq!(TrustMode::Safe.next(), TrustMode::Auto);
assert_eq!(TrustMode::Auto.next(), TrustMode::Safe);
assert_eq!(TrustMode::Plan.next(), TrustMode::Plan); }
#[test]
fn test_mode_ordering() {
assert!(TrustMode::Plan < TrustMode::Safe);
assert!(TrustMode::Safe < TrustMode::Auto);
}
#[test]
fn test_clamp() {
assert_eq!(
TrustMode::clamp(TrustMode::Plan, TrustMode::Auto),
TrustMode::Plan
);
assert_eq!(
TrustMode::clamp(TrustMode::Safe, TrustMode::Auto),
TrustMode::Safe
);
assert_eq!(
TrustMode::clamp(TrustMode::Auto, TrustMode::Safe),
TrustMode::Safe
);
assert_eq!(
TrustMode::clamp(TrustMode::Auto, TrustMode::Auto),
TrustMode::Auto
);
}
#[test]
fn derive_child_trust_fork_identity() {
for parent in [TrustMode::Plan, TrustMode::Safe, TrustMode::Auto] {
assert_eq!(
derive_child_trust(parent, parent),
parent,
"fork (parent==declared) must return parent verbatim"
);
}
}
#[test]
fn derive_child_trust_named_clamps_down() {
assert_eq!(
derive_child_trust(TrustMode::Safe, TrustMode::Auto),
TrustMode::Safe
);
assert_eq!(
derive_child_trust(TrustMode::Plan, TrustMode::Auto),
TrustMode::Plan
);
assert_eq!(
derive_child_trust(TrustMode::Plan, TrustMode::Safe),
TrustMode::Plan
);
}
#[test]
fn derive_child_trust_child_already_stricter_passes_through() {
assert_eq!(
derive_child_trust(TrustMode::Auto, TrustMode::Plan),
TrustMode::Plan
);
assert_eq!(
derive_child_trust(TrustMode::Auto, TrustMode::Safe),
TrustMode::Safe
);
assert_eq!(
derive_child_trust(TrustMode::Safe, TrustMode::Plan),
TrustMode::Plan
);
}
#[test]
fn derive_child_trust_is_commutative_in_min_but_not_in_meaning() {
for a in [TrustMode::Plan, TrustMode::Safe, TrustMode::Auto] {
for b in [TrustMode::Plan, TrustMode::Safe, TrustMode::Auto] {
assert_eq!(derive_child_trust(a, b), derive_child_trust(b, a));
}
}
}
#[test]
fn test_mode_from_str() {
assert_eq!(TrustMode::parse("auto"), Some(TrustMode::Auto));
assert_eq!(TrustMode::parse("safe"), Some(TrustMode::Safe));
assert_eq!(TrustMode::parse("plan"), Some(TrustMode::Plan));
assert_eq!(TrustMode::parse("yolo"), Some(TrustMode::Auto));
assert_eq!(TrustMode::parse("confirm"), Some(TrustMode::Safe));
assert_eq!(TrustMode::parse("strict"), Some(TrustMode::Safe));
assert_eq!(TrustMode::parse("normal"), Some(TrustMode::Safe));
assert_eq!(TrustMode::parse("readonly"), Some(TrustMode::Plan));
assert_eq!(TrustMode::parse("read-only"), Some(TrustMode::Plan));
assert_eq!(TrustMode::parse("accept"), Some(TrustMode::Auto));
assert_eq!(TrustMode::parse("nope"), None);
}
#[test]
fn test_mode_from_u8() {
assert_eq!(TrustMode::from(0), TrustMode::Plan);
assert_eq!(TrustMode::from(1), TrustMode::Safe);
assert_eq!(TrustMode::from(2), TrustMode::Auto);
assert_eq!(TrustMode::from(99), TrustMode::Safe); }
#[test]
fn test_shared_trust_cycle() {
let shared = new_shared_trust(TrustMode::Safe);
assert_eq!(read_trust(&shared), TrustMode::Safe);
let next = cycle_trust(&shared);
assert_eq!(next, TrustMode::Auto);
assert_eq!(read_trust(&shared), TrustMode::Auto);
}
#[test]
fn test_display() {
assert_eq!(TrustMode::Plan.to_string(), "plan");
assert_eq!(TrustMode::Safe.to_string(), "safe");
assert_eq!(TrustMode::Auto.to_string(), "auto");
}
#[test]
fn test_default() {
assert_eq!(TrustMode::default(), TrustMode::Safe);
}
const READ_ONLY_TOOLS: &[&str] = &[
"Read",
"List",
"Grep",
"Glob",
"MemoryRead",
"ListAgents",
"InvokeAgent",
"WebFetch",
"WebSearch",
"ListSkills",
"ActivateSkill",
];
#[test]
fn test_read_tools_always_approved() {
for tool in READ_ONLY_TOOLS {
for mode in [TrustMode::Plan, TrustMode::Safe, TrustMode::Auto] {
assert_eq!(
check_tool(tool, &serde_json::json!({}), mode, None),
ToolApproval::AutoApprove,
"{tool} should auto-approve in {mode:?}"
);
}
}
}
#[test]
fn test_plan_blocks_all_writes() {
for tool in ["Write", "Edit", "Delete", "MemoryWrite", "TodoWrite"] {
assert_eq!(
check_tool(tool, &serde_json::json!({}), TrustMode::Plan, None),
ToolApproval::Blocked,
"{tool} should be blocked in Plan mode"
);
}
}
#[test]
fn test_safe_confirms_writes() {
for tool in ["Write", "Edit", "Delete", "MemoryWrite", "TodoWrite"] {
assert_eq!(
check_tool(tool, &serde_json::json!({}), TrustMode::Safe, None),
ToolApproval::NeedsConfirmation,
"{tool} should need confirmation in Safe mode"
);
}
}
#[test]
fn test_auto_approves_non_outside() {
let expected = if crate::sandbox::is_available() {
ToolApproval::AutoApprove
} else {
ToolApproval::NeedsConfirmation
};
for tool in ["Write", "Edit", "TodoWrite"] {
assert_eq!(
check_tool(tool, &serde_json::json!({}), TrustMode::Auto, None),
expected,
"{tool} in Auto mode"
);
}
assert_eq!(
check_tool("WebFetch", &serde_json::json!({}), TrustMode::Auto, None),
ToolApproval::AutoApprove,
);
}
#[test]
fn test_auto_approves_destructive() {
let expected = if crate::sandbox::is_available() {
ToolApproval::AutoApprove
} else {
ToolApproval::NeedsConfirmation
};
assert_eq!(
check_tool("Delete", &serde_json::json!({}), TrustMode::Auto, None),
expected,
);
}
#[test]
fn test_safe_bash_read_only_auto_approved() {
let args = serde_json::json!({"command": "git status"});
assert_eq!(
check_tool("Bash", &args, TrustMode::Safe, None),
ToolApproval::AutoApprove,
);
}
#[test]
fn test_gh_read_only_auto_approved() {
for cmd in [
"gh issue view 42",
"gh pr view 99",
"gh pr list",
"gh issue list",
] {
let args = serde_json::json!({"command": cmd});
assert_eq!(
check_tool("Bash", &args, TrustMode::Safe, None),
ToolApproval::AutoApprove,
"{cmd} should auto-approve even in Safe mode"
);
}
}
#[test]
fn test_gh_destructive_needs_confirmation_in_safe() {
for cmd in [
"gh pr merge 42 --squash",
"gh issue delete 42",
"gh repo delete owner/repo",
] {
let args = serde_json::json!({"command": cmd});
assert_eq!(
check_tool("Bash", &args, TrustMode::Safe, None),
ToolApproval::NeedsConfirmation,
"{cmd} should need confirmation in Safe mode"
);
}
}
#[test]
fn test_gh_mutation_auto_approved_in_auto() {
for cmd in [
"gh issue create --title 'bug'",
"gh issue edit 42",
"gh pr create",
] {
let args = serde_json::json!({"command": cmd});
assert_eq!(
check_tool("Bash", &args, TrustMode::Auto, None),
ToolApproval::AutoApprove,
"{cmd} should auto-approve in Auto mode"
);
assert_eq!(
check_tool("Bash", &args, TrustMode::Safe, None),
ToolApproval::NeedsConfirmation,
"{cmd} should need confirmation in Safe mode"
);
}
}
#[test]
fn test_dev_workflow_bash_needs_confirmation_in_safe() {
let args = serde_json::json!({"command": "cargo test --release"});
assert_eq!(
check_tool("Bash", &args, TrustMode::Safe, None),
ToolApproval::NeedsConfirmation,
);
}
#[test]
fn test_dangerous_bash_needs_confirmation_in_safe() {
let args = serde_json::json!({"command": "rm -rf target/"});
assert_eq!(
check_tool("Bash", &args, TrustMode::Safe, None),
ToolApproval::NeedsConfirmation,
);
}
#[test]
fn test_plan_blocks_bash() {
let args = serde_json::json!({"command": "cargo test"});
assert_eq!(
check_tool("Bash", &args, TrustMode::Plan, None),
ToolApproval::Blocked,
);
}
#[test]
fn test_invoke_agent_auto_approved() {
let args = serde_json::json!({"agent_name": "reviewer", "prompt": "review this"});
for mode in [TrustMode::Plan, TrustMode::Safe, TrustMode::Auto] {
assert_eq!(
check_tool("InvokeAgent", &args, mode, None),
ToolApproval::AutoApprove,
);
}
}
#[test]
fn test_write_outside_project_needs_confirmation() {
let root = Path::new("/home/user/project");
let args = serde_json::json!({"path": "/etc/hosts"});
assert_eq!(
check_tool("Write", &args, TrustMode::Auto, Some(root)),
ToolApproval::NeedsConfirmation,
);
}
#[test]
fn test_write_inside_project_auto_approved() {
let root = Path::new("/home/user/project");
let args = serde_json::json!({"path": "src/main.rs"});
assert_eq!(
check_tool("Write", &args, TrustMode::Auto, Some(root)),
ToolApproval::AutoApprove,
);
}
#[test]
fn test_edit_with_dotdot_escape_needs_confirmation() {
let root = Path::new("/home/user/project");
let args = serde_json::json!({"path": "../../../etc/passwd"});
assert_eq!(
check_tool("Edit", &args, TrustMode::Auto, Some(root)),
ToolApproval::NeedsConfirmation,
);
}
#[test]
fn test_bash_cd_outside_needs_confirmation() {
let root = Path::new("/home/user/project");
let args = serde_json::json!({"command": "cd /etc && ls"});
assert_eq!(
check_tool("Bash", &args, TrustMode::Auto, Some(root)),
ToolApproval::NeedsConfirmation,
);
}
#[test]
fn test_bash_cd_inside_auto_approved() {
let root = Path::new("/home/user/project");
let args = serde_json::json!({"command": "cd src && ls"});
assert_eq!(
check_tool("Bash", &args, TrustMode::Auto, Some(root)),
ToolApproval::AutoApprove,
);
}
#[test]
fn test_no_project_root_skips_path_check() {
let args = serde_json::json!({"path": "/etc/hosts"});
assert_eq!(
check_tool("Write", &args, TrustMode::Auto, None),
ToolApproval::AutoApprove,
);
}
#[test]
fn test_write_to_tmp_auto_approved() {
let root = Path::new("/home/user/project");
let args = serde_json::json!({"path": "/tmp/issue-draft.md"});
assert_eq!(
check_tool("Write", &args, TrustMode::Auto, Some(root)),
ToolApproval::AutoApprove,
"/tmp writes should auto-approve"
);
}
#[test]
fn test_bash_cd_tmp_auto_approved() {
let root = Path::new("/home/user/project");
let args = serde_json::json!({"command": "cd /tmp && ls"});
assert_eq!(
check_tool("Bash", &args, TrustMode::Auto, Some(root)),
ToolApproval::AutoApprove,
"cd /tmp should auto-approve"
);
}
#[test]
fn test_write_to_etc_still_blocked() {
let root = Path::new("/home/user/project");
let args = serde_json::json!({"path": "/etc/hosts"});
assert_eq!(
check_tool("Write", &args, TrustMode::Auto, Some(root)),
ToolApproval::NeedsConfirmation,
"/etc writes should still need confirmation"
);
}
#[tokio::test]
async fn test_delete_owned_file_auto_approved() {
let dir = tempfile::TempDir::new().unwrap();
let db = crate::db::Database::open(&dir.path().join("test.db"))
.await
.unwrap();
let mut tracker = FileTracker::new("test-sess", db).await;
let root = Path::new("/home/user/project");
let owned_path = root.join("temp_output.md");
tracker.track_created(owned_path).await;
let args = serde_json::json!({"path": "temp_output.md"});
assert_eq!(
check_tool_with_tracker("Delete", &args, TrustMode::Auto, Some(root), Some(&tracker),),
ToolApproval::AutoApprove,
"Delete of Koda-owned file should auto-approve"
);
}
#[tokio::test]
async fn test_delete_unowned_file_needs_confirmation_in_safe() {
let dir = tempfile::TempDir::new().unwrap();
let db = crate::db::Database::open(&dir.path().join("test.db"))
.await
.unwrap();
let tracker = FileTracker::new("test-sess", db).await;
let root = Path::new("/home/user/project");
let args = serde_json::json!({"path": "user_file.rs"});
assert_eq!(
check_tool_with_tracker("Delete", &args, TrustMode::Safe, Some(root), Some(&tracker),),
ToolApproval::NeedsConfirmation,
"Delete of unowned file should need confirmation in Safe mode"
);
}
#[tokio::test]
async fn test_delete_owned_file_safe_mode_auto_approved() {
let dir = tempfile::TempDir::new().unwrap();
let db = crate::db::Database::open(&dir.path().join("test.db"))
.await
.unwrap();
let mut tracker = FileTracker::new("test-sess", db).await;
let root = Path::new("/home/user/project");
let owned_path = root.join("scratch.txt");
tracker.track_created(owned_path).await;
let args = serde_json::json!({"path": "scratch.txt"});
assert_eq!(
check_tool_with_tracker("Delete", &args, TrustMode::Safe, Some(root), Some(&tracker),),
ToolApproval::AutoApprove,
"Delete of Koda-owned file should auto-approve even in Safe mode"
);
}
#[test]
fn test_no_tracker_safe_mode_delete_needs_confirmation() {
let root = Path::new("/home/user/project");
let args = serde_json::json!({"path": "some_file.rs"});
assert_eq!(
check_tool_with_tracker("Delete", &args, TrustMode::Safe, Some(root), None),
ToolApproval::NeedsConfirmation,
"Without tracker, Delete should need confirmation in Safe"
);
}
}