Show HN: Control Claude permissions using a cloud-based decision table UI
14 points| sidgarimella | 1 month ago |github.com
The result is a surprisingly useful policy/gating layer– these tables let your team:
- Write conditional, exception-friendly policies beyond globs/prefixes (e.g. allow rm -rf only in */node_modules/*, deny / or $HOME, ask if --force or network call; gate kubectl delete / SQL DROP with a clear reason)
- Roll out policy changes instantly (mid-run, flip a risky operation from allow → ask; the next attempt across devs and agents is gated immediately– no git pull or agent restart required)
- Adopt lightweight governance that is somewhat agent agnostic and survives churn (MCP/skills/etc)- just add columns/rules as new tools and metadata show up
- Gain a central utility to understand which tools are being used, which tools get blocked most often, and why
bflesch|1 month ago
"May collect cookies"? Do you think google makes money by collecting cookies? You are brazenly lying into my face and even using a dark pattern to hide this ridiculously formulated sentence at the bottom of the screen.
Why does your company decide to employ falsehoods and dark patterns at such an obvious place? It erodes any trust.
sidgarimella|1 month ago
threecheese|1 month ago
furyofantares|1 month ago
You mean you don't just have it aliased to "claude" ?
sidgarimella|1 month ago
Thoughts on /permissions from the CLI?
sidgarimella|1 month ago
iqandjoke|1 month ago
sidgarimella|1 month ago
hrimfaxi|1 month ago
sidgarimella|1 month ago
unknown|1 month ago
[deleted]