tftsr-devops_investigation/src-tauri/capabilities/default.json
Shaun Arman e117cb30c4
Some checks failed
Test / frontend-typecheck (pull_request) Successful in 1m59s
Test / wiki-sync (pull_request) Has been skipped
Test / frontend-tests (pull_request) Successful in 1m44s
Test / rust-fmt-check (pull_request) Failing after 4m23s
Test / rust-clippy (pull_request) Failing after 22m44s
Test / rust-tests (pull_request) Failing after 24m0s
fix(security): harden secret handling and audit integrity
Remove high-risk defaults and tighten data handling across auth, storage, IPC, provider calls, and capabilities so sensitive data is better protected by default. Also update README/wiki security guidance and add targeted tests for the new hardening behaviors.

Made-with: Cursor
2026-04-04 23:37:05 -05:00

31 lines
827 B
JSON

{
"$schema": "../node_modules/@tauri-apps/cli/schema/acl-schema.json",
"identifier": "default",
"description": "Default capabilities for TFTSR — least-privilege",
"windows": ["main"],
"permissions": [
"core:path:default",
"core:event:default",
"core:window:default",
"core:app:default",
"core:resources:default",
"core:menu:default",
"core:tray:default",
"dialog:allow-open",
"dialog:allow-save",
"fs:allow-read-text-file",
"fs:allow-write-text-file",
"fs:allow-read",
"fs:allow-write",
"fs:allow-mkdir",
"fs:allow-app-read-recursive",
"fs:allow-app-write-recursive",
"fs:allow-temp-read-recursive",
"fs:allow-temp-write-recursive",
"fs:scope-app-recursive",
"fs:scope-temp-recursive",
"shell:allow-open",
"http:default"
]
}