Give Claude Code, Cursor, and other AI coding agents the ability to run sudo — with case-by-case GUI approval, no passwordless sudo, no /etc/sudoers allowlists.
Your sudo password is encrypted with your SSH private key and only decrypted after you approve a dialog showing the exact command about to run. Deny the dialog and nothing happens.
Coding agents can't handle interactive terminal prompts. Ask Claude Code to run sudo apt install foo and you get sudo: Authentication failed. The common workarounds all have problems:
- Passwordless sudo gives the agent — and anything else running as your user — unrestricted root.
/etc/sudoersallowlists require predicting every command the agent will ever need. No case-by-case review.- Manual copy-paste is tedious and breaks the agent's flow.
sudoplz plugs into sudo -A, so the agent runs sudo -A <command>, you see a dialog with the exact command, and you click Allow or Deny. Works for any command without pre-declaring what's permitted.
This threat model assumes a personal workstation with an encrypted disk and a passphrase-protected SSH key. Not appropriate for shared or production systems.
- Use traditional
sudo, notsudo-rs.sudo-rsdoesn't support askpass. Check withsudo --version— it should say "Sudo version 1.x.x". If you're onsudo-rs, switch:sudo update-alternatives --install /usr/bin/sudo sudo /usr/bin/sudo.ws 100 sudo update-alternatives --config sudo # pick sudo.ws - Make sure you have an SSH key (ed25519, ecdsa, rsa, or dsa).
- Install system dependencies:
age— required if your SSH key is Ed25519 (the most common case today).sudo pacman -S age/sudo apt install age/brew install age.zenityon Linux — provides the GUI approval dialog. Pre-installed on most GNOME-based distros;sudo apt install zenityif missing. Not needed on macOS (uses AppleScript).
- Install from PyPI with
uv:This putsuv tool install sudoplz
askpassandsudoplzon your PATH. (For development: clone the repo and runuv tool install .instead.) - Point
SUDO_ASKPASSat the installed binary (add to~/.bashrc,~/.zshrc, etc.):export SUDO_ASKPASS="$(which askpass)"
- Store your sudo password:
sudoplz set
Your agent (or you) runs sudo -A <command>. A dialog pops up showing the command. You approve or deny.
sudo -A apt install fooGotcha: sudo -n explicitly disallows prompting and will never trigger askpass. Always use -A.
Test the integration with:
sudoplz testPasswords are encrypted with your SSH key:
- Ed25519:
ageencryption, stored at~/.sudo_askpass.age - RSA/ECDSA/DSA: OpenSSL asymmetric encryption, stored at
~/.sudo_askpass.ssh
Encrypted files have 600 permissions. Key preference: ed25519 > ecdsa > rsa > dsa. Falls back to the system keyring if available. Refuses plain text storage.
Encryption alone doesn't cover every abuse path — anything running as your user can in principle request decryption. The askpass script runs these checks on every invocation; any failure means no decryption:
- Caller path whitelist. Only decrypts when the caller's working directory is on an allowlist (home,
/tmp, etc.). Blocks invocations from unexpected locations like/var/tmp/malicious. - Caller process whitelist. Parent process must be on an allowlist (sudo, your shell, your IDE, your deploy tool). Keeps arbitrary binaries from invoking askpass directly.
- User confirmation. A GUI dialog asks for approval on each decryption, so any sudo elevation you didn't initiate is visible and can be denied.
- Rate limiting. Configurable max-attempts-per-hour and lockout window. Contains runaway scripts and brute-force attempts.
- Password expiration. Stored passwords age out automatically (default: 1 week). A stolen blob becomes useless once it expires, even with your SSH key.
Configure these in ~/.config/sudoplz/config.json — an example is shipped as askpass-config.json in the repo; copy it and edit.
Ed25519 is a signing algorithm (EdDSA), not encryption. OpenSSL handles RSA encryption directly, but Ed25519 keys can't do asymmetric encryption at all. age was designed to work with SSH keys including Ed25519.
If your SSH key has a passphrase (recommended), the askpass tool will:
- Check whether the key is loaded in ssh-agent
- Prompt for the passphrase via GUI if it isn't
- Load the key into ssh-agent for the session
You enter the passphrase once per session. After that, sudo commands only need the confirmation dialog. You need a running ssh-agent — most desktop environments start one on login; if not, eval "$(ssh-agent -s)" in your shell startup.
This works under sudo -A even though sudo strips SSH_AUTH_SOCK: the script reconnects to your running ssh-agent.
sudoplz set # Store password (terminal prompt; expires per config, 1 week default)
sudoplz set-totp # Store password with TOTP verification (headless)
sudoplz totp-setup # Set up TOTP for headless sessions
sudoplz get # Check if password exists
sudoplz clear # Remove password
sudoplz test # Test sudo integration
sudoplz audit # Show recent askpass usageFor servers or SSH sessions without a display, authenticate with TOTP.
sudoplz totp-setupPrints a TOTP secret and an otpauth:// URL to add to your authenticator app.
sudoplz set-totpEnter your 6-digit TOTP code, then your password.
When DISPLAY isn't set, askpass prompts for a TOTP code:
# Interactive — prompts for TOTP code
sudo -A command
# Non-interactive — pass TOTP via environment
TOTP="123456" sudo -A commandThe idea — an SSH-key-encrypted sudo password served via SUDO_ASKPASS, gated by a confirmation dialog — is from GlassOnTin/secure-askpass. That project is dormant; sudoplz is a substantially rewritten and cleaned up fork. Thanks to @GlassOnTin for the original idea.
MIT — see LICENSE.
