Skip to content

False positive: content.outside_boundary blocks legitimate cross-repo colony work #4

@sunir

Description

@sunir

Problem

The content.outside_boundary rule blocks any file access outside the repo's CWD. This breaks all colony infrastructure agents (Spiral, Vector, etc.) that legitimately access sibling repos under ~/source/.

Examples blocked:

  • git log --all in ~/source/ when CWD is a subrepo
  • File reads in sibling repos by infrastructure agents

Fix

Options (in order of preference):

  1. Allow ~/source/* sibling paths via .bashguard.yaml allowed_paths config
  2. Make outside_boundary opt-in (disabled by default, enabled per-project)
  3. Allowlist colony sibling repos explicitly

The rule intent is sound (prevent agents reading sensitive files outside their project) but the implementation is too broad for multi-repo environments.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions