Mosaic CLI Docs 中文

Policy

Approvals + Sandbox: Practical Policy Baseline

Use policy controls to gate risky commands and keep local runtime safety predictable.

Step 1: Inspect current policy state

mosaic --project-state approvals get
mosaic --project-state sandbox get
mosaic --project-state safety get

Step 2: Set approvals mode

mosaic --project-state approvals set confirm
mosaic --project-state approvals get

# stricter mode
mosaic --project-state approvals set deny

# controlled automation mode
mosaic --project-state approvals set allowlist

Step 3: Manage allowlist prefixes

mosaic --project-state approvals allowlist add "git status"
mosaic --project-state approvals allowlist add "git diff"
mosaic --project-state approvals allowlist list
mosaic --project-state approvals allowlist remove "git diff"

Step 4: Check command-level approval decision

mosaic --project-state approvals check --command "git status"
mosaic --project-state approvals check --command "rm -rf /tmp/x"

Step 5: Set and explain sandbox profile

mosaic --project-state sandbox list
mosaic --project-state sandbox set standard
mosaic --project-state sandbox explain --profile restricted
mosaic --project-state sandbox explain --profile elevated

Step 6: Check command-level sandbox decision

mosaic --project-state sandbox check --command "git status"
mosaic --project-state sandbox check --command "curl https://example.com"

Step 7: Validate merged safety decision

mosaic --project-state safety check --command "git status"
mosaic --project-state safety check --command "curl https://example.com"
mosaic --project-state safety report --audit-tail 50 --compare-window 24h

Step 8: Team baseline recommendation

  • Default baseline: approvals=confirm + sandbox=standard.
  • Use allowlist only for explicit CI automation prefixes.
  • Run doctor and safety report in release checks.