docs(security): clarify acpx yolo mode

This commit is contained in:
Vincent Koc
2026-03-31 20:53:27 +09:00
parent d8c68c8d42
commit 5474796735
5 changed files with 23 additions and 0 deletions

View File

@@ -102,6 +102,7 @@ Permission model (client debug mode):
- `read` auto-approval is scoped to the current working directory (`--cwd` when set).
- ACP only auto-approves narrow readonly classes: scoped `read` calls under the active cwd plus readonly search tools (`search`, `web_search`, `memory_search`). Unknown/non-core tools, out-of-scope reads, exec-capable tools, control-plane tools, mutating tools, and interactive flows always require explicit prompt approval.
- Server-provided `toolCall.kind` is treated as untrusted metadata (not an authorization source).
- This ACP bridge policy is separate from ACPX harness permissions. If you run OpenClaw through the `acpx` backend, `plugins.entries.acpx.config.permissionMode=approve-all` is the break-glass “yolo” switch for that harness session.
## How to use this