npx skills add https://github.com/akillness/oh-my-skills --skill ralphmodeRalphmode 是一个跨平台的权限配置文件,适用于长时间运行的 ralph 或 jeo 工作流。它减少了审批摩擦,但并非“允许在任何地方执行任何操作”。其核心规则很简单:仅在限定的项目或一次性沙盒内放宽自动化权限,并明确阻止访问密钥和执行破坏性命令。
ralph 能够迭代运行,而无需重复的审批弹窗。在更改任何权限模式之前:
.env*、secrets/**、生产环境凭据、rm -rf、sudo、未经检查的 。广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
curl | sh如果答案是“一次性沙盒”,您可以使用平台的最高自主权模式。否则,请使用仓库范围的预设。
仅使用与当前工具匹配的部分:
bypassPermissions 仅用于隔离的沙盒。permissions.allow 和 permissions.deny 代码片段视为仅用于兼容性。优先使用项目本地配置,而非用户全局默认配置。
.claude/settings.json 开始。~/ 或广泛的父目录。如果必须使用用户全局默认配置,请搭配更严格的拒绝列表和沙盒边界一起使用。
配置权限后:
ralph 或 jeo 的计划-执行-验证循环。推荐的执行契约:
boundary check -> permission profile -> ralph run -> verify -> cleanup or revert
将它们视为不同的模式:
不要将它们合并为一个共享的团队默认设置。
静态权限配置文件(步骤 2-3)减少了运行开始前的摩擦,但无法阻止执行过程中出现的危险操作。添加动态检查点,以便在第 1 级操作被尝试时立即阻止或标记。
| 等级 | 操作 | 平台响应 |
|---|---|---|
| 第 1 级(始终阻止) | rm -rf、git reset --hard、git push --force、DROP TABLE、sudo、访问 .env*/secrets/**、生产环境更改 | 立即阻止,需要用户明确批准 |
| 第 2 级(警告) | npm publish、docker push、git push(非强制)、数据库迁移 | 输出警告,仅在确认后继续 |
| 第 3 级(允许) | 文件读取/编辑、测试、本地构建、代码检查 | 自动允许 |
| 平台 | 钩子 | 是否阻塞 | 推荐模式 |
|---|---|---|---|
| Claude Code | PreToolUse (Bash) | 是 — exit 2 | Shell 脚本模式匹配命令;阻止第 1 级操作 |
| Gemini CLI | BeforeTool | 是 — 非零退出码 | Shell 脚本阻止工具;stderr 传递给下一轮 |
| Codex CLI | notify (后轮) | 否 | approval_policy="unless-allow-listed" + 提示契约 |
| OpenCode | 无 | 否 | 在 opencode.json 说明中的提示契约 |
原则:将静态配置文件(步骤 2-3)与动态检查点(本步骤)结合使用。
approval_policy 和明确的提示契约,指示代理输出 CHECKPOINT_NEEDED: <原因> 并在继续执行第 1 级操作前等待。完整的各平台钩子脚本模板请参见 references/permission-profiles.md。
使用 references/permission-profiles.md 中的 Claude 沙盒预设,然后仅在该隔离仓库内运行 Ralph:
/ralph "fix all failing tests" --max-iterations=10
对于沙盒 ralph 运行,直接使用 CLI 标志:
codex -c model_reasoning_effort="high" --dangerously-bypass-approvals-and-sandbox -c model_reasoning_summary="detailed" -c model_supports_reasoning_summaries=true
对于仓库范围(非沙盒)的运行,使用 references/permission-profiles.md 中的配置文件方法:
approval_policy = "never"
sandbox_mode = "workspace-write"
将此内容放入 ~/.codex/config.toml(或项目本地覆盖文件)中,并在运行 Ralph 前重启 Codex。
对于沙盒 ralph 运行,使用 --yolo 模式:
gemini --yolo
对于普通仓库自动化,通过显式文件选择信任当前项目文件夹,并仅针对该仓库运行 Ralph 工作流。详情请参见 references/permission-profiles.md。
每周安装数
1
仓库
GitHub 星标数
3
首次出现
1 天前
安全审计
安装于
mcpjam1
claude-code1
junie1
windsurf1
zencoder1
crush1
Ralphmode is a cross-platform permission profile for long-running ralph or jeo workflows. It reduces approval friction, but it is not "allow everything everywhere." The core rule is simple: widen automation only inside a bounded project or disposable sandbox, and keep secrets plus destructive commands explicitly blocked.
ralph to iterate without repeated approval popups.Before changing any permission mode:
.env*, secrets/**, production credentials, rm -rf, sudo, unchecked curl | sh.If the answer is "disposable sandbox," you may use the platform's highest-autonomy mode. If not, use the repo-scoped preset instead.
Use only the section that matches the current tool:
bypassPermissions only for isolated sandboxes.permissions.allow and permissions.deny snippets as compatibility-only.Detailed templates live in references/permission-profiles.md.
Prefer project-local configuration over user-global defaults.
.claude/settings.json.~/ or broad parent directories.If you must use a user-global default, pair it with a stricter denylist and a sandbox boundary.
After permissions are configured:
ralph or the jeo plan-execute-verify loop.Recommended execution contract:
boundary check -> permission profile -> ralph run -> verify -> cleanup or revert
Treat these as different modes:
Do not collapse them into one shared team default.
Static permission profiles (Steps 2–3) reduce friction before a run starts, but they do not stop dangerous operations that arise during execution. Add dynamic checkpoints so that Tier 1 actions are blocked or flagged at the moment they are attempted.
| Tier | Action | Platform response |
|---|---|---|
| Tier 1 (always block) | rm -rf, git reset --hard, git push --force, DROP TABLE, sudo, .env*/secrets/** access, production environment changes | Block immediately, require explicit user approval |
| Tier 2 (warn) | npm publish, , (non-force), DB migrations |
| Platform | Hook | Blocking | Recommended pattern |
|---|---|---|---|
| Claude Code | PreToolUse (Bash) | Yes — exit 2 | Shell script pattern-matches command; blocks Tier 1 |
| Gemini CLI | BeforeTool | Yes — non-zero exit | Shell script blocks tool; stderr fed to next turn |
| Codex CLI | notify (post-turn) | No | approval_policy="unless-allow-listed" + prompt contract |
| OpenCode | None | No |
Principle : Combine static profiles (Steps 2–3) with dynamic checkpoints (this step).
approval_policy and explicit prompt contracts that instruct the agent to output CHECKPOINT_NEEDED: <reason> and wait before proceeding with Tier 1 actions.See references/permission-profiles.md for full hook script templates per platform.
Use the Claude sandbox preset from references/permission-profiles.md, then run Ralph only inside that isolated repo:
/ralph "fix all failing tests" --max-iterations=10
For sandbox ralph runs, use the CLI flags directly:
codex -c model_reasoning_effort="high" --dangerously-bypass-approvals-and-sandbox -c model_reasoning_summary="detailed" -c model_supports_reasoning_summaries=true
For repo-scoped (non-sandbox) runs, use the config file approach from references/permission-profiles.md:
approval_policy = "never"
sandbox_mode = "workspace-write"
Place this in ~/.codex/config.toml (or a project-local override) and restart Codex before running Ralph.
For sandbox ralph runs, use --yolo mode:
gemini --yolo
For normal repo automation, trust the current project folder with explicit file selection and run the Ralph workflow for that repo only. See references/permission-profiles.md for details.
Weekly Installs
1
Repository
GitHub Stars
3
First Seen
1 day ago
Security Audits
Gen Agent Trust HubWarnSocketFailSnykWarn
Installed on
mcpjam1
claude-code1
junie1
windsurf1
zencoder1
crush1
通过 LiteLLM 代理让 Claude Code 对接 GitHub Copilot 运行 | 高级变通方案指南
31,600 周安装
docker pushgit push| Output warning, continue only with confirmation |
| Tier 3 (allow) | File reads/edits, tests, local builds, lint | Allow automatically |
Prompt contract in opencode.json instructions |