Skip to content

Guard workspace-write against unsafe workspace roots #29

@t-kalinowski

Description

@t-kalinowski

Claude Desktop launches mcp servers from /. This is problematic with the default mcp-repl sandbox configuration of workspace-write, since it causes the sandbox to treat / as the workspace root and gives the repl process broad write permissions.

One possible solution: add guardrails to mcp-repl to reject / or ~ as workspace roots with workspace-write, and fall back to read-only when they are encountered. It might also make sense to fall back to read-only if there is not a .git directory in a project.

Source: #28

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions