Skip to content

docs: clarify per-audience tool and memory permissions in security model#31

Merged
Aaronontheweb merged 1 commit into
devfrom
docs/per-audience-permissions-clarification
May 19, 2026
Merged

docs: clarify per-audience tool and memory permissions in security model#31
Aaronontheweb merged 1 commit into
devfrom
docs/per-audience-permissions-clarification

Conversation

@Aaronontheweb
Copy link
Copy Markdown
Contributor

What

Clarifies the Per-Audience Permissions section of the security model page.

  • Adds a Memory column to the per-audience table and a paragraph noting memory is hard-disabled for the Public audience (no recall, no writes, no memory tools). Verified against SessionRecallManager.cs, LlmSessionActor.cs, and MemoryIndexContextLayer.cs in the netclaw source.
  • Corrects the file_write explanation. The previous text claimed Team omits file_write because "Team sessions are longer-lived and shared across users" — that rationale isn't in the source and contradicts the table (both Team and Public are session-scoped via CreateSessionScopedFilesystemAccess()). New text frames it accurately: filesystem scope is the real boundary, the file_write grant is a per-audience default.
  • Adds a TODO comment referencing Review Team vs. Public audience tool profiles — Public grants file_write, Team doesn't netclaw#1084, which tracks reviewing the Public/Team tool-profile asymmetry.

Why

The page made Team look more restricted than Public on tool calls. The table data is correct (confirmed against ToolAudienceProfiles.cs), but the explanatory prose was inaccurate, and the Public memory disable was undocumented.

Verification

  • npm run build passes (55 pages).

Add a Memory column to the per-audience permissions table and note that
memory is hard-disabled for the Public audience (no recall, no writes, no
memory tools).

Correct the file_write explanation: both Team and Public confine
filesystem access to a session-scoped temp directory, so the file_write
grant difference is a tool-grant default rather than a filesystem-scope
difference. Drop the unsupported claim about Team session lifetime.

Add a TODO referencing netclaw-dev/netclaw#1084, which tracks reviewing
the Public/Team tool profile asymmetry.
@Aaronontheweb Aaronontheweb enabled auto-merge (squash) May 19, 2026 02:27
@Aaronontheweb Aaronontheweb merged commit 593afbd into dev May 19, 2026
2 checks passed
@Aaronontheweb Aaronontheweb deleted the docs/per-audience-permissions-clarification branch May 19, 2026 02:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant