Claude Code uses a tiered permission system to balance power and safety:

Tool TypeExampleApproval Required”Yes, don’t ask again” Behavior
Read-onlyFile reads, LS, GrepNoN/A
Bash CommandsShell executionYesPermanently per project directory and command
File ModificationEdit/write filesYesUntil session end

Tools available to Claude

Claude Code has access to a set of powerful tools that help it understand and modify your codebase:

ToolDescriptionPermission Required
AgentRuns a sub-agent to handle complex, multi-step tasksNo
BashExecutes shell commands in your environmentYes
GlobFinds files based on pattern matchingNo
GrepSearches for patterns in file contentsNo
LSLists files and directoriesNo
ReadReads the contents of filesNo
EditMakes targeted edits to specific filesYes
WriteCreates or overwrites filesYes
NotebookEditModifies Jupyter notebook cellsYes
NotebookReadReads and displays Jupyter notebook contentsNo
WebFetchFetches content from a specified URLYes

Permission rules can be configured using /allowed-tools or in permission settings.

Protect against prompt injection

Prompt injection is a technique where an attacker attempts to override or manipulate an AI assistant’s instructions by inserting malicious text. Claude Code includes several safeguards against these attacks:

  • Permission system: Sensitive operations require explicit approval
  • Context-aware analysis: Detects potentially harmful instructions by analyzing the full request
  • Input sanitization: Prevents command injection by processing user inputs
  • Command blocklist: Blocks risky commands that fetch arbitrary content from the web like curl and wget

Best practices for working with untrusted content:

  1. Review suggested commands before approval
  2. Avoid piping untrusted content directly to Claude
  3. Verify proposed changes to critical files
  4. Report suspicious behavior with /bug

While these protections significantly reduce risk, no system is completely immune to all attacks. Always maintain good security practices when working with any AI tool.

Configure network access

Claude Code requires access to:

  • api.anthropic.com
  • statsig.anthropic.com
  • sentry.io

Allowlist these URLs when using Claude Code in containerized environments.

Development container reference implementation

Claude Code provides a development container configuration for teams that need consistent, secure environments. This preconfigured devcontainer setup works seamlessly with VS Code’s Remote - Containers extension and similar tools.

The container’s enhanced security measures (isolation and firewall rules) allow you to run claude --dangerously-skip-permissions to bypass permission prompts for unattended operation. We’ve included a reference implementation that you can customize for your needs.

While the devcontainer provides substantial protections, no system is completely immune to all attacks. Always maintain good security practices and monitor Claude’s activities.

Key features

  • Production-ready Node.js: Built on Node.js 20 with essential development dependencies
  • Security by design: Custom firewall restricting network access to only necessary services
  • Developer-friendly tools: Includes git, ZSH with productivity enhancements, fzf, and more
  • Seamless VS Code integration: Pre-configured extensions and optimized settings
  • Session persistence: Preserves command history and configurations between container restarts
  • Works everywhere: Compatible with macOS, Windows, and Linux development environments

Getting started in 4 steps

  1. Install VS Code and the Remote - Containers extension
  2. Clone the Claude Code reference implementation repository
  3. Open the repository in VS Code
  4. When prompted, click “Reopen in Container” (or use Command Palette: Cmd+Shift+P → “Remote-Containers: Reopen in Container”)

Configuration breakdown

The devcontainer setup consists of three primary components:

Security features

The container implements a multi-layered security approach with its firewall configuration:

  • Precise access control: Restricts outbound connections to whitelisted domains only (npm registry, GitHub, Anthropic API, etc.)
  • Default-deny policy: Blocks all other external network access
  • Startup verification: Validates firewall rules when the container initializes
  • Isolation: Creates a secure development environment separated from your main system

Customization options

The devcontainer configuration is designed to be adaptable to your needs:

  • Add or remove VS Code extensions based on your workflow
  • Modify resource allocations for different hardware environments
  • Adjust network access permissions
  • Customize shell configurations and developer tooling

Was this page helpful?