Skip to main content

Permissions Reference

34 allow | 4 ask | 30 deny | 16 environment variables

The ADLC framework configures Claude Code's permission system as the second line of defense (hooks are first). Permissions are enforced by the Claude Code runtime before hook scripts fire.


3-Tier Permission Model

Allow (34 entries) -- Auto-approved

Operations that are always safe and do not require user confirmation.

CategoryPermissions
File readingRead(*), Glob(*), Grep(*)
Directory inspectionBash(tree:*), Bash(ls:*), Bash(find:*)
Git read-onlygit status, git log, git diff, git show, git branch, git remote
Task commandsBash(task:*), task cdk:*, task terraform:*, task docs:*, task spec:*
Terraform read-onlyterraform init/validate/fmt/version/providers/output/show/state list/state show/graph/test/terraform-docs
Security scanninginfracost:*, checkov:*, tflint:*, trivy:*, tfsec:*
Containerdocker exec adlc-*:*, docker compose:*
Package inspectionnpm outdated, npm audit, npm view, uv pip list, pip index, pip show
Testingnpm test, npx playwright:*, go test:*, go version:*
Utilitiesjq:*, mkdir:*, cat:*, terragrunt:*

Ask (4 entries) -- User prompted

Operations that are generally safe but benefit from human review before execution.

PermissionRationale
Bash(terraform plan:*)Shows infrastructure changes -- review before applying
Bash(tofu plan:*)OpenTofu equivalent
Write(*)Creating new files -- review content
Edit(*)Modifying existing files -- review changes

Deny (30 entries) -- Permanently blocked

Operations that must never be performed by agents. These are blocked at the Claude Code runtime level.

CategoryBlocked Permissions
Sensitive file reading.env, .env.*, secrets/**, *.pem, *.key, *.secret, kubeconfig, *credentials*
Destructive systemrm -rf:*, sudo:*, dd:*, mkfs:*
IaC mutationsterraform apply/destroy/state rm/import/taint, tofu apply/destroy, cdk deploy/destroy/bootstrap
Git mutationsgit add/commit/push/merge/rebase/reset/revert/stash/cherry-pick/tag
Kubernetes destructivekubectl delete:*, helm delete/uninstall:*, k3d cluster delete:*
Publishingnpm publish:*, docker push:*

Environment Variables

16 variables configure ADLC enforcement behavior at runtime.

VariableValuePurpose
ADLC_VERSION3.4.0Framework version
ADLC_CONSTITUTION_VERSION2.1.0Active constitution
ADLC_ENFORCEMENT_MODEBLOCKINGHooks enforce (not advisory)
ADLC_AGENT_AGREEMENT_THRESHOLD95Minimum PO+CA agreement %
ADLC_STRICT_EVIDENCEtrueEvidence paths must resolve to files
ADLC_NO_NATOtrueCompletion claims require evidence
ADLC_MAX_PDCA_CYCLES7HITL escalation trigger
ADLC_MANDATORY_AGENTSproduct-owner,cloud-architectRequired coordination agents
ADLC_EVIDENCE_DIRtmp/Root evidence directory
ADLC_FRAMEWORK_DIRframework/Framework source directory
ADLC_INVEST_MIN_SCORE4Minimum INVEST score for features
ADLC_PASS_RATE_THRESHOLD99.5Constitutional pass rate target
ADLC_COVERAGE_THRESHOLD80Code coverage target %
ADLC_VISUAL_DIFF_THRESHOLD1Visual regression pixel threshold
ADLC_TRACK_ENFORCEMENTtrueTrack classification enabled
ADLC_TARGET_INDUSTRIESFSI,Energy,Telecom,AviationEnterprise industry profiles

Anti-Pattern Declarations

The settings.json declares 12 anti-patterns with BLOCKED status. These serve as documentation and configuration for enforcement hooks.

Anti-PatternStatusDescription
STANDALONE_EXECUTIONBLOCKEDSpecialist work without PO+CA approval
RUBBER_STAMP_COORDINATIONBLOCKEDBackground agent launch then proceed
NATO_VIOLATIONBLOCKEDClaims without evidence paths
LOCALSTACK_FOR_K8SBLOCKEDUsing LocalStack for K3D/K3S (0% value)
SKIP_CONSUMER_E2EBLOCKEDPublishing without consumer verification
ROOT_FILE_POLLUTIONBLOCKEDCreating .md files at project root
SSOT_BYPASSBLOCKEDEditing derived docs instead of sources
ENTERPRISE_CODE_LEAKBLOCKEDEnterprise code in public rendering
MISSING_TRACK_FIELDBLOCKEDMarketplace components without track field
CI_CONTAINER_EACCESBLOCKEDContainer job without --user 0
SUBMODULE_PAT_MISSINGBLOCKEDCheckout submodules without PAT token

Agent Utilization Matrix

Recommended agent team composition by task type.

Task TypeAgents
New featureproduct-owner, cloud-architect, infrastructure-engineer
Bug fixqa-engineer, infrastructure-engineer
Security auditsecurity-compliance-engineer, qa-engineer
Cost analysiscloud-architect, observability-engineer
Deploymentcloud-architect, infrastructure-engineer, qa-engineer
npm releaseqa-engineer, cloud-architect
Documentationfrontend-docs-engineer, product-owner
Framework extensionmeta-engineering-expert, qa-engineer

Mandatory Workflow Patterns

PatternEnabledBlockingDescription
ENTERPRISE_FRAMEWORKYesYesPO+CA must be invoked first
PARALLEL_SPECIALISTYesNoSpecialists execute in parallel after coordination
EVIDENCE_BASED_COMPLETIONYesYesCompletions require artifacts in tmp/
PDCA_AUTONOMOUSYesEscalationMax 7 cycles, then HITL escalation
TRACK_CLASSIFICATIONYesYesMarketplace components need track field