Remove high-risk defaults and tighten data handling across auth, storage, IPC, provider calls, and capabilities so sensitive data is better protected by default. Also update README/wiki security guidance and add targeted tests for the new hardening behaviors. Made-with: Cursor
31 lines
827 B
JSON
31 lines
827 B
JSON
{
|
|
"$schema": "../node_modules/@tauri-apps/cli/schema/acl-schema.json",
|
|
"identifier": "default",
|
|
"description": "Default capabilities for TFTSR — least-privilege",
|
|
"windows": ["main"],
|
|
"permissions": [
|
|
"core:path:default",
|
|
"core:event:default",
|
|
"core:window:default",
|
|
"core:app:default",
|
|
"core:resources:default",
|
|
"core:menu:default",
|
|
"core:tray:default",
|
|
"dialog:allow-open",
|
|
"dialog:allow-save",
|
|
"fs:allow-read-text-file",
|
|
"fs:allow-write-text-file",
|
|
"fs:allow-read",
|
|
"fs:allow-write",
|
|
"fs:allow-mkdir",
|
|
"fs:allow-app-read-recursive",
|
|
"fs:allow-app-write-recursive",
|
|
"fs:allow-temp-read-recursive",
|
|
"fs:allow-temp-write-recursive",
|
|
"fs:scope-app-recursive",
|
|
"fs:scope-temp-recursive",
|
|
"shell:allow-open",
|
|
"http:default"
|
|
]
|
|
}
|