26 lines
1009 B
Markdown
26 lines
1009 B
Markdown
# Safety and Risk Controls
|
|
|
|
## High-risk capabilities
|
|
- `eval` (arbitrary JavaScript)
|
|
- `--allow-file-access` (local file access)
|
|
- `--executable-path`, `--args`, `--cdp` (custom runtime control)
|
|
- `network route` / `set headers` / `--proxy` (traffic manipulation)
|
|
- `set credentials`, cookies, storage, and state files (secret handling)
|
|
|
|
## Safe mode checklist
|
|
1. Allowlist target domains; block localhost and private networks.
|
|
2. Disallow `eval` unless explicitly required.
|
|
3. Disallow local file access unless explicitly required.
|
|
4. Avoid downloads and filesystem writes by default.
|
|
5. Use ephemeral sessions; avoid persistent profiles when possible.
|
|
6. Redact tokens in logs and outputs.
|
|
|
|
## Escalation policy
|
|
- Require explicit human approval before using any high-risk capability.
|
|
- Record the reason and scope of the approval (which URLs, which action).
|
|
|
|
## Supply-chain hygiene
|
|
- Pin CLI version and review upgrades.
|
|
- Install in a dedicated environment.
|
|
- Avoid running with elevated OS privileges.
|