Skip to content

Security

Claude Rules is a local CLI tool with a narrow attack surface:

  • No network access — makes no HTTP requests, opens no sockets
  • No code execution — no eval, Function(), or dynamic imports
  • No telemetry — collects and transmits nothing
  • Scoped file access — writes only to .claude/rules/ and CLAUDE.md
  • Interactive approval — every extraction requires user confirmation
ThreatMitigation
Data loss from bad splitInteractive approval + --dry-run mode + .bak backup of original
Malformed rule filesvalidate command catches all structural issues
Stale indexvalidate detects drift between frontmatter and index.json
Arbitrary file writesWrites scoped to .claude/rules/ (or --rules-dir) directory only
Partial write failureStaged to temp dir first; files copied only after all staging succeeds

If you discover a security issue, please email 64996768+mcp-tool-shop@users.noreply.github.com with:

  • Description of the vulnerability
  • Steps to reproduce
  • Impact assessment

We will respond within 7 days and aim to release a fix within 14 days for confirmed issues.