Skip to content

Conversation

@tcdent
Copy link
Owner

@tcdent tcdent commented Feb 3, 2026

Integrate tirith-core library to analyze shell commands before execution,
detecting security threats like:

  • Homograph attacks (Unicode lookalikes)
  • Terminal injection (ANSI escapes, bidi controls)
  • Pipe-to-shell patterns (curl | bash)
  • Insecure transport and credential exposure

The security analysis runs in a separate thread to avoid blocking the
async runtime. Commands flagged as dangerous are blocked; warnings are
prepended to output for suspicious but allowed commands.

Note: Security analysis is skipped in test mode to avoid resource
contention with timing-sensitive tests.

https://claude.ai/code/session_01JWGY085M4E96QV0R2XPM1CEX

Integrate tirith-core library to analyze shell commands before execution,
detecting security threats like:
- Homograph attacks (Unicode lookalikes)
- Terminal injection (ANSI escapes, bidi controls)
- Pipe-to-shell patterns (curl | bash)
- Insecure transport and credential exposure

The security analysis runs in a separate thread to avoid blocking the
async runtime. Commands flagged as dangerous are blocked; warnings are
prepended to output for suspicious but allowed commands.

Note: Security analysis is skipped in test mode to avoid resource
contention with timing-sensitive tests.

https://claude.ai/code/session_01JWGY085M4E96QV0R2XPM1CEX
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants