Security ManifestGovernance boundaries and autonomous permission boundaries.
Compliance ModeStrict Enforcement
SandboxIsolated execution environment with strict boundaries.
Allows
Read-only file access
Query database operations
LLM reasoning & planning
MCP tool read operations
Blocks
Code modifications
Production deployments
Shell command execution
MCP write operations
Destructive file operations
Active Tier
AutonomousFull operational authority with guardrails and audit trail.
Allows
Code modifications & PRs
Staging deployments
Shell command execution
MCP full access
File create/modify/delete
Database read/write
Blocks
Production deployments (requires approval)
Cross-account resource access
SuperClaw
Medium RiskCapabilities
- Read/Write Memory
- Dispatch Tasks
- Trigger Deployments
- Read Traces
Linked Resources
MemoryTableAgentBusDeployerTraceTable
Coder Agent
High RiskCapabilities
- Write Code
- Read Code
- Pre-flight Validation
Linked Resources
StagingBucketLocal Filesystem
Strategic Planner
Medium RiskCapabilities
- Prioritize Capability Gaps
- Draft Evolution Plans
- Dispatch Evolution Tasks
Linked Resources
ConfigTableMemoryTableAgentBus
Cognition Reflector
Low RiskCapabilities
- Distill Memory
- Extract Tactical Lessons
- Identify Capability Gaps
Linked Resources
TraceTableMemoryTable
QA Auditor
Low RiskCapabilities
- Verify Task Completion
- Analyze Execution Traces
- Close Capability Gaps
Linked Resources
TraceTableMemoryTableAgentBus
Build Monitor
Low RiskCapabilities
- Read Build Logs
- Emit Failure Events
Linked Resources
CodeBuild LogsAgentBus
Protected Resource Labeling
sst.config.tsHARD_BLOCK
Prevents resource deletionInfra
src/tools/index.tsHARD_BLOCK
Prevents tool hijackingLogic
src/lib/agent.tsHARD_BLOCK
Prevents prompt injection in coreCore
buildspec.ymlHARD_BLOCK
Prevents pipeline tamperingCI/CD
src/infra/**HARD_BLOCK
Protects AWS definitionsTopology
infra/bootstrap/**HARD_BLOCK
Critical setup protectionBootstrap
Writing to these paths requires Human-in-the-Loop (HITL) approval via Telegram. The Coder Agent cannot bypass this block.
Infrastructure Boundaries (IAM)
Permissions are hardware-enforced at the AWS IAM level. Agents only have access to the specific resources linked in sst.config.ts.
Principle of Least PrivilegeScoped Tokens