Allows destructive operations within your project but blocks them outside the project directory. Built for --dangerously-skip-permissions mode where Claude doesn't ask — this plugin is your safety net.
- claude-code-safety-net — blocks
rmeverywhere; Project Boundary allows it inside the project so refactoring works normally. - destructive-command-guard — only distinguishes
/tmpvs everything else; Project Boundary uses$CLAUDE_PROJECT_DIRas the actual boundary. - claude-code-damage-control — requires manually listing protected paths; Project Boundary automatically protects everything outside the project.
| Operation | Inside project | Outside project |
|---|---|---|
rm, rm -rf |
Allowed | Blocked |
mv (source and destination) |
Allowed | Blocked |
cp (source and destination) |
Allowed | Blocked |
ln (source and target) |
Allowed | Blocked |
chmod / chown |
Allowed | Blocked |
> / >> redirect |
Allowed | Blocked |
tee / tee -a |
Allowed | Blocked |
curl -o / curl --output |
Allowed | Blocked |
wget -O / wget --output-document |
Allowed | Blocked |
find -delete / find -exec rm |
Allowed | Blocked |
dd of= |
Allowed | Blocked |
install (source, destination, --target-directory=) |
Allowed | Blocked |
rsync (source, destination, --log-file=, --partial-dir=, --backup-dir=, --temp-dir=, --write-batch=, --only-write-batch=) |
Allowed | Blocked |
tar -C / --directory= |
Allowed | Blocked |
unzip -d / cpio -D |
Allowed | Blocked |
| Edit tool (file edits) | Allowed | Blocked |
| MultiEdit tool (multi-file edits) | Allowed | Blocked |
| Write tool (file creation) | Allowed | Blocked |
| Command | Reason |
|---|---|
bash -c "..." / sh -c "..." |
Nested shell — cannot inspect inner command |
eval '...' |
Cannot safely parse evaluated code |
Piping to sh / bash |
Inner commands invisible to guard |
xargs rm/mv/cp/... |
Arguments cannot be validated |
python -c / ruby -e / perl -e / node --eval / php -r/-R/--run / Rscript -e / osascript -e |
Inline interpreter code is opaque to the Bash parser |
awk '... system("...") ...' (and similar | "sh") |
Awk programs can shell out without the guard seeing the inner command |
env -S / env --split-string / env -C / env --chdir |
These either smuggle a real command inside a string or change the working directory before the inner tool runs |
$(...) / backticks (outside single quotes) |
Command substitution target is uninspectable. Single-quoted forms like '$(cmd)' and arithmetic expansion $((2+2)) are allowed. |
$VAR / ${VAR} and positional / special parameters ($1 … $9, $@, $*, $#, $?, $$, $!, $-) outside single quotes |
Variable expansion target is uninspectable for the same reason as $(...). Only $HOME / ${HOME} is allowed (canonical home path). Use literal values inline, or reach for the Read / Grep tools instead of piping shell vars. ANSI-C $'…', i18n $"…", backslash-escaped \$VAR, single-quoted '$VAR', and quoted-heredoc bodies are unaffected. |
- Chained commands — splits on
;,&&,||,|, and unquoted newlines, then checks each sub-command independently cwdawareness — usescwdfrom the hook event, so commands run outside the project (without an explicitcd) are also guardedcdtracking —cd /tmp && rm -rf somethingis blocked becausecdleft the project;cd ~/your-repo && rm fileis allowed even if the eventcwdwas outside ($PROJECTand other non-$HOMEvariables are uninspectable, so use~/$HOMEor a literal path)- Destructive subcommands outside project — when running outside the project (via event
cwdorcd), these are blocked:git clean -f,git checkout .,git restore .,git reset --hard,git push --force,git stash drop/clear,git branch -D,git reflog expire,rails db:drop/reset,rake db:drop/reset. Safe commands likegit status,git log,rails routesremain allowed. sudoprefix — stripped before checking, sosudo rm /etc/passwdis still blockedfindoptions — handles-L,-H,-Pbefore the search path- Path traversal —
..segments are resolved before boundary check ~and$HOMEexpansion —rm ~/fileandrm $HOME/fileare correctly detected as outside-project- Symlink resolution — handles macOS
/var→/private/var, dereferences symlink chains in Edit/Write/MultiEdit (fail-closed after 20 hops) /dev/nullbit-bucket —curl -o /dev/null,2>/dev/null,tee /dev/null,dd of=/dev/null, and all redirect target forms are allowed so routine probe and silencing workflows don't hit the boundary. Narrow exemption: the discard-only walkers short-circuit beforeis_write_permitted;sed -i /dev/null,truncate /dev/null, andcp|mv|ln ... /dev/nullremain blocked because each performs a real filesystem write under/dev/.- POSIX
--end-of-options —install,rsync,sed -i, andtruncatecontinue parsing operands after a literal--, sorsync … -- -outside/fileand similar dash-prefixed targets are validated rather than silently skipped as flags.
Some paths legitimately live outside every project — e.g. Claude Code's auto-memory under ~/.claude/projects/<slug>/memory/, which needs to persist across projects by design. The allowlist file lets you permit writes to those paths without loosening the project boundary for everything else.
Scope: the allowlist is a WRITE exception only. It applies to the gentle write paths — Edit / Write / MultiEdit, redirects (> / >>), tee, curl -o, wget -O, dd of=, and similar — and to cd into an allowlisted directory. It deliberately does not apply to destructive or move/copy operations (rm, mv, cp, ln, chmod, chown, find -delete, find -exec rm, install, rsync, tar -C, unzip -d, cpio -D) or to script execution and shell redirection from outside paths. An allowlist entry that grants WRITE to ~/.claude/projects/*/memory/** will not let rm or rsync run against that path.
Format: one glob pattern per line; # starts a comment; ~ expands to $HOME; ** matches across path segments (bash globstar), * within a single segment.
Defaults shipped with the plugin:
~/.claude/projects/*/memory/**— Claude Code auto-memory
Warning
Do not mass-add entries to the allowlist. Every entry is an escape hatch from the boundary, and Claude is creative enough to find non-obvious workarounds through allowed paths — for example: symlink-chasing from an allowlisted dir into sensitive files, writing executable content that some other tool later sources, or staging payloads in an allowed dir before moving them elsewhere. Widening the allowlist to something like ~/.claude/** would let Claude overwrite settings.json or your shell rc files. Keep entries narrow, purpose-specific, and comment each one with the reason it exists. Prefer asking Claude for explicit per-write permission over adding entries.
- Paths with spaces work when properly quoted (single or double quotes). Unquoted paths with spaces are not supported.
- Brace expansion (
{a,b,c}) is not enumerated — literal match only ~user/(home of another user) is not expanded; only~/(current user) is handled
The common idiom git commit -m "$(cat <<'EOF' … EOF)" is blocked on purpose — command substitution $(…) is fail-closed because the inner command is not inspectable in the general case ($(cat && rm /etc/passwd) looks identical to the parser). Making an exception for one shape of cat would just open a new bypass category.
The supported pattern is heredoc on stdin:
git commit -F - <<'EOF'
Subject line
Body paragraph.
EOFRepeated -m works for shorter messages where every paragraph fits on one line:
git commit -m "Subject line" -m "Body paragraph."Avoid: writing the message to .git/COMMIT_* files (triggers a Write-tool prompt) or to /tmp/*_msg.txt (outside-project, blocked). The SessionStart hook ships a one-line hint that points Claude at the heredoc form on the first try, so no manual nudging is needed.
Direct:
claude --plugin-dir /path/to/claude-code-project-boundary
From marketplace:
/plugin marketplace add davepoon/buildwithclaude
/plugin install project-boundary@buildwithclaude
Pure-bash PreToolUse hooks for Bash, Edit, MultiEdit, and Write tools. The Bash hook splits chained commands and resolves target paths (handling symlinks, .., ~, $HOME); the Edit, MultiEdit, and Write hooks perform file path boundary checks against $CLAUDE_PROJECT_DIR. Dependencies: bash + jq.
bash tests/test_guard.sh
Full test suite covering all guard scenarios. CI runs on Ubuntu and macOS.
MIT