Overview
Usesettings.yaml to control what Poolside agents can do in your IDE and in the pool CLI.
You can use it to:
- Allow or block specific tools
- Automatically approve or deny certain tool calls
- Limit which files agents can read or modify
- Run agents inside a sandbox with stronger runtime boundaries
How permissions work
Poolside permissions involve several layers. Each layer can restrict what an agent is able to do.| Layer | Managed by | What it controls |
|---|---|---|
| Role-based permissions | Administrators | What users can do in the organization |
| Agent configuration | Administrators or users | Which tools, Model Context Protocol (MCP) servers, repositories, and sandboxes an agent can use |
settings.yaml | Individual users or teams | Tool approvals, path rules, and local sandbox configuration |
| Sandbox | Administrators or users | Runtime file system and network boundaries |
settings.yaml to anything their role or the agent configuration does not already allow.
Prompt injection is possible whenever an agent consumes external input, such as code from third-party packages or external documentation. Treat agent actions with the same caution you would apply to running code you do not trust.
Main controls in settings.yaml
Most users interact with three configuration areas.
| Setting | Purpose |
|---|---|
tools | Turn tools off or define auto-approval rules |
paths | Restrict which files the agent can read or modify |
sandbox | Run agents inside an isolated runtime environment |
- Tools decide what actions the agent can attempt
- Paths decide which files the agent can access through file tools
- Sandbox defines where the agent runs
tools and paths mainly control approvals and explicit file operations. They do not fully sandbox the agent.If you need an enforced runtime boundary, use a sandbox.
The shell tool
Treat the shell tool as high risk. Shell commands can:
- Install software
- Modify files
- Run scripts
shell may read or modify files outside the restrictions defined in paths.
If you need strict file access controls, turn off shell or run agents inside a sandbox.
File locations
Poolside readssettings.yaml from three locations.
| File location | Use this for |
|---|---|
.poolside/settings.local.yaml | Personal, project-specific. Do not commit. Takes precedence over all other files. |
.poolside/settings.yaml | Shared, project-specific. Commit and share with your team. |
~/.config/poolside/settings.yaml | Personal defaults, all projects. Applies when no project-level settings override it. |
.poolside/settings.local.yaml.poolside/settings.yaml~/.config/poolside/settings.yaml
.poolside/settings.local.yaml is the right place for personal restrictions.
For command-line tool defaults across projects, use ~/.config/poolside/settings.yaml.
Project-local example
Use relative paths in.poolside/settings.local.yaml.
User-global example
Use absolute paths or~ paths in ~/.config/poolside/settings.yaml.
Approvals
Approvals let you automatically allow or deny specific tool calls, which reduces repeated confirmation prompts when you trust certain operations. Rules:- If a tool call does not match an
allowrule, Poolside asks for approval. denyrules always overrideallow.
IDE approvals
In the IDE, you can:- Approve a tool call once
- Always approve a matching tool call
- Deny a tool call
.poolside/settings.local.yaml file.
To open the permissions settings file directly from the IDE, run /approvals in the chat panel or use the Poolside: Open Permissions Settings command.
Running commands without approval prompts
If you have theAuto Approve Commands permission, you can enable Execute commands without asking in Poolside Assistant to run most tool calls automatically without prompting for approval. This includes shell commands, file operations, and MCP tool calls.
The Auto Approve Commands permission applies to all agents in your organization and is off by default.
When you enable Execute commands without asking:
- Most tool calls run immediately without confirmation
- Poolside ignores approval allow rules
- Deny rules still apply
- Secrets are not auto-approved unless already authorized in your settings or earlier in the conversation
- In the prompt input box, type
/to open the Commands menu. - Under Settings, select Approvals, or type
/approvalsand press Enter. - Select the Execute commands without asking DANGEROUS checkbox.
pool command-line tool (CLI). For more information, see Run in automated mode.
Command-line tool approvals
In thepool command-line tool, tool calls require approval unless a matching allow rule exists in settings.yaml, or you have the Auto Approve Commands permission and pool runs with --unsafe-auto-allow=true.
When --unsafe-auto-allow=true is set:
- Tool calls run without prompts
- Deny rules still apply
Tool rules
Usetools to turn tools off or configure approval rules. File access tools such as read and edit are controlled by paths, not tools.
Example:
- Tool rules support only
*wildcards.**is not supported. - The rule string must match the tool call shown in the approval prompt.
- Subshells and composite shell commands always require manual approval.
- Shell commands that use control operators such as
|are not supported by auto-approval.
Path rules
Usepaths to control which files agents can access through explicit file tools.
Example:
- Poolside treats paths as read-only by default.
- Paths without
write: trueremain read-only. write: trueallows edits, deletes, moves, and renames.denyoverridesallow.- Path patterns support
*and**. - Use forward slashes for all paths, including Windows paths.
- Windows-volume paths do not match on Linux, and Linux paths do not match on Windows.
- In
.poolside/settings.local.yaml, paths must be relative to the project. - In
~/.config/poolside/settings.yaml, paths must be absolute or start with~.
Read-only configuration
Allow reading files but block modifications.Read-write configuration
Allow edits only in specific directories.Protect sensitive files across projects
To block access to sensitive files in every project, add deny rules to your user-global~/.config/poolside/settings.yaml file:
deny rules always override allow.
Local sandbox
A sandbox creates a stronger runtime boundary. Sandbox workspace access supports two modes:read-only: tools can read files, and you review changes before Poolside applies themread-write: tools can modify workspace files directly
~/.config/poolside/settings.yaml file.
Example configuration:
- container runtime image
- workspace file access
- network destinations
/sandbox.
Glob reference
Tool rule syntax
| Pattern | Matches | Does not match |
|---|---|---|
go vet * | go vet, go vet -vettool shadow | go run |
gh * list * | gh pr list, gh gist list | gh list |
*matches zero or more characters including/**is not supported
Path rule syntax
| Pattern | Matches | Does not match |
|---|---|---|
/src/**/*.go | /src/main.go, /src/pkg/run.go | /other/src/main.go |
C:/**/bin/* | C:/Tools/bin/app.exe | D:/Tools/bin/app.exe |
*matches characters except/**matches across directories*:/Program Files/**matches any Windows volume