Type
shellVariants
Safe Commands, Full Access, Read Only
Common Use Cases
Running system diagnosticsExecute health checks, performance monitoring, and system analysis
Executing deployment scriptsRun deployment workflows, configuration updates, and releases
Querying system informationGather OS details, disk usage, network status, and resource metrics
Process managementStart, stop, monitor, and manage system processes
Variants Overview
| Variant | Security | Key Permissions | Best For | Create Command |
|---|---|---|---|---|
| Safe Commands 🟢 | Safe | Pre-approved safe commands only | System monitoring, diagnostics | --variant safe_commands |
| Full Access 🔴 | Unrestricted | Execute any shell command | Admin tasks, deployments | --variant full_access |
| Read Only 🟢 | Secure | View-only commands (ls, cat, grep) | Auditing, compliance checks | --variant read_only |
Configuration
Example Configuration:📋 Full Configuration Reference
📋 Full Configuration Reference
| Parameter | Type | Default | Description |
|---|---|---|---|
allowed_commands | array | variant-specific | Whitelist of permitted commands |
blocked_commands | array | variant-specific | Blacklist of forbidden commands |
timeout | number | 60 | Command timeout in seconds |
max_output_size | string | ”10MB” | Maximum output capture size |
working_directory | string | ”/“ | Default command working directory |
environment_variables | object | Custom environment variables |
⚙️ Variant-Specific Defaults
⚙️ Variant-Specific Defaults
Safe Commands:
allowed_commands: [“ls”, “cat”, “grep”, “find”, “ps”, “top”, “df”, “echo”, “git status”, …]blocked_commands: [“rm”, “dd”, “mkfs”, “sudo”, “chmod”, “chown”]
allowed_commands: [”*”] (all commands)blocked_commands: [] (none blocked)
allowed_commands: [“ls”, “cat”, “grep”, “find”, “ps”, “top”, “df”, “free”]- All write operations blocked
Quick Start
View Complete Examples
See full production deployment patterns, CI/CD configurations, and troubleshooting guides
Command Patterns
Wildcards and Subcommands
You can use patterns to allow command families:Environment Variable Expansion
Commands can reference environment variables:Security Best Practices
Use Command Whitelisting
Use Command Whitelisting
Explicitly specify
allowed_commands rather than relying on blocked_commands. Whitelisting is more secure than blacklisting.Set Reasonable Timeouts
Set Reasonable Timeouts
Always configure command timeouts to prevent runaway processes.
Avoid Full Access in Production
Avoid Full Access in Production
Use Safe Commands variant for production. Reserve Full Access for development or isolated admin tasks.
Troubleshooting & Related Skills
Command Not Found
Command Not Found
Solutions:
- Verify command is installed on worker system
- Check
PATHenvironment variable includes command location - Use full path:
/usr/bin/kubectlinstead ofkubectl
Permission Denied
Permission Denied
Solutions:
- Ensure worker process user has OS-level permissions
- Check file permissions on scripts or binaries
- Verify
working_directoryis accessible
Command Blocked Unexpectedly
Command Blocked Unexpectedly
Solutions:
- Check exact command string matches (including subcommands)
- Verify no
blocked_commandsoverride - Use
"*"wildcard for command families:"git*"