1.1 KiB
1.1 KiB
Write Mode
Threat Model
Write mode introduces mutation risk (issue/PR changes, metadata updates). Risks include unauthorized action, accidental mass updates, and audit evasion.
Default Posture
WRITE_MODE=falseby default.- Even when enabled, writes require repository whitelist membership.
- Policy engine remains authoritative and may deny specific write tools.
Supported Write Tools
create_issueupdate_issuecreate_issue_commentcreate_pr_commentadd_labelsassign_issue
Not supported (explicitly forbidden): merge actions, branch deletion, force push.
Enablement Steps
- Set
WRITE_MODE=true. - Set
WRITE_REPOSITORY_WHITELIST=owner/repo,.... - Review policy file for write-tool scope.
- Verify audit logging and alerting before rollout.
Safe Operations
- Start with one repository in whitelist.
- Use narrowly scoped bot credentials.
- Require peer review for whitelist/policy changes.
- Disable write mode during incident response if abuse is suspected.
Risk Tradeoffs
Write mode improves automation and triage speed but increases blast radius. Use least privilege, tight policy, and strong monitoring.