Skip to main content
Every tool call passes through a policy check before it runs. The check matches the call against your rules and decides: allow, ask, or block.

Default posture

Two postures depending on whether the write targets an app, repo, or storage (with a known scope) or the computer’s raw filesystem. Out of the box, Kazzle ships with sensible defaults so the AI works immediately.
CategoryDefaultEffect
Terminal commands* allowAll commands allowed, with exceptions
Browser domains* allowAll domains allowed
File paths (app/repo)allowWrites are scoped, always allowed
File paths (computer)/workspace/* allowOnly workspace paths, everything else blocked
Sensitive patternsblock.env*, .ssh/*, *.pem, *.key blocked everywhere
Destructive toolsaskDelete, deploy, push always need approval
Safety toolsask (always, one-off only)Cannot be auto-approved via “Always allow”
Writes to apps, repos, and storage are allowed by default because their paths are scoped to a known root. Raw computer writes (no scoped target) are restricted to /workspace/*.

Four categories

Terminal commands

Rules match by command prefix. git push matches git push origin main. The wildcard * matches everything. Default exceptions that require approval: git push, sudo, curl, wget. Default block: git push --force.

Browser domains

Rules match by domain. *.github.com matches api.github.com. The wildcard * matches all domains.

File paths

Rules match by glob pattern. /workspace/* matches any file inside workspace. *.pem matches certificate files anywhere. Default blocks: .env*, .ssh/*, *.pem, *.key. These are blocked even inside workspace. File path rules can be scoped to a specific computer. A rule with “All computers” applies everywhere. A rule scoped to one computer only applies when the AI is working on that machine. Computer-specific rules take priority over global ones.

Tool approvals

Individual tools can be set to allow, ask, or block. Destructive tools like app_delete, drive_delete, database_delete, and database_query default to ask.

How rules resolve

When the AI calls a tool, the router finds all matching rules and picks the most specific one. Longer patterns beat shorter ones. If two rules match with equal specificity, deny wins over allow. User-defined rules (from Settings) override defaults with the same pattern.

Configuring

Open Settings > AI Safety to manage rules per space. Add patterns, change policies, scope file paths to specific computers. Changes take effect immediately.