By default, Crush asks for permission before running tool calls. You can configure which tools are allowed to run without prompting, or disable tools entirely for security.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/charmbracelet/crush/llms.txt
Use this file to discover all available pages before exploring further.
Permission Prompts
When Crush wants to use a tool, it will prompt you for permission:- y - Allow this specific tool call
- n - Deny this tool call
- always - Always allow this tool without prompting
Allowing Tools
To allow specific tools without permission prompts, add them toallowed_tools:
Read-Only Tools
Safe read-only tools you might want to allow:Safe Edit Tools
If you trust Crush to make edits:Including MCP Tools
Allow specific MCP tools by their prefixed name:mcp_{server-name}_{tool-name}
YOLO Mode
For maximum productivity (and minimum safety), use the--yolo flag to skip all permission prompts:
When to Use YOLO Mode
✅ Safe scenarios:- Working in a throwaway development environment
- Everything is in version control
- Testing or experimentation
- You’re watching what Crush does
- Production systems
- Unversioned code
- Shared environments
- When you’re not paying attention
Disabling Built-In Tools
Completely disable tools by adding them todisabled_tools:
Disabled tools are completely hidden from the agent. Crush won’t even know they exist.
Available Tools to Disable
Built-in tools you can disable:agent- Launch sub-agentsbash- Execute shell commandsjob_output- Get background job outputjob_kill- Kill background jobsdownload- Download files from URLsedit- Edit filesmultiedit- Edit multiple fileslsp_diagnostics- Get LSP diagnosticslsp_references- Find LSP referenceslsp_restart- Restart LSP serversfetch- Fetch web contentagentic_fetch- Agentic web browsingglob- Find files by patterngrep- Search file contentsls- List directory contentssourcegraph- Search with Sourcegraphtodos- Manage todo itemsview- Read fileswrite- Write fileslist_mcp_resources- List MCP resourcesread_mcp_resource- Read MCP resources
Disabling Dangerous Tools
For maximum safety, disable potentially dangerous tools:Read-Only Mode
To make Crush read-only, disable all write tools:- Read files (
view) - Search files (
grep,glob) - List directories (
ls) - Use LSP for code intelligence
- Answer questions about your code
Disabling MCP Tools
Disable specific tools from MCP servers:Security Best Practices
1. Start Restrictive
Begin with minimal permissions and add tools as needed:2. Use Version Control
Always use version control (Git) so you can review and revert changes:3. Review Changes
Before committing, review what Crush changed:4. Project-Specific Permissions
Use project-specific.crush.json for sensitive projects:
5. Audit Logs
Enable debug logging to audit what Crush does:./.crush/logs/crush.log.
Permission Levels
Here are recommended permission levels for different scenarios:Level 1: Maximum Security (Read-Only)
Level 2: Moderate Security (Safe Edits)
Level 3: Balanced (Most Tools)
Level 4: YOLO (Maximum Productivity)
Next Steps
Tools Overview
Learn about all available tools
MCP Configuration
Configure MCP server permissions