Permission Prompts
When Crush wants to use a tool, it will prompt you for permission:- y - Allow this specific tool call
- n - Deny this tool call
- always - Always allow this tool without prompting
Allowing Tools
To allow specific tools without permission prompts, add them toallowed_tools:
Read-Only Tools
Safe read-only tools you might want to allow:Safe Edit Tools
If you trust Crush to make edits:Including MCP Tools
Allow specific MCP tools by their prefixed name:mcp_{server-name}_{tool-name}
YOLO Mode
For maximum productivity (and minimum safety), use the--yolo flag to skip all permission prompts:
When to Use YOLO Mode
✅ Safe scenarios:- Working in a throwaway development environment
- Everything is in version control
- Testing or experimentation
- You’re watching what Crush does
- Production systems
- Unversioned code
- Shared environments
- When you’re not paying attention
Disabling Built-In Tools
Completely disable tools by adding them todisabled_tools:
Disabled tools are completely hidden from the agent. Crush won’t even know they exist.
Available Tools to Disable
Built-in tools you can disable:agent- Launch sub-agentsbash- Execute shell commandsjob_output- Get background job outputjob_kill- Kill background jobsdownload- Download files from URLsedit- Edit filesmultiedit- Edit multiple fileslsp_diagnostics- Get LSP diagnosticslsp_references- Find LSP referenceslsp_restart- Restart LSP serversfetch- Fetch web contentagentic_fetch- Agentic web browsingglob- Find files by patterngrep- Search file contentsls- List directory contentssourcegraph- Search with Sourcegraphtodos- Manage todo itemsview- Read fileswrite- Write fileslist_mcp_resources- List MCP resourcesread_mcp_resource- Read MCP resources
Disabling Dangerous Tools
For maximum safety, disable potentially dangerous tools:Read-Only Mode
To make Crush read-only, disable all write tools:- Read files (
view) - Search files (
grep,glob) - List directories (
ls) - Use LSP for code intelligence
- Answer questions about your code
Disabling MCP Tools
Disable specific tools from MCP servers:Security Best Practices
1. Start Restrictive
Begin with minimal permissions and add tools as needed:2. Use Version Control
Always use version control (Git) so you can review and revert changes:3. Review Changes
Before committing, review what Crush changed:4. Project-Specific Permissions
Use project-specific.crush.json for sensitive projects:
5. Audit Logs
Enable debug logging to audit what Crush does:./.crush/logs/crush.log.
Permission Levels
Here are recommended permission levels for different scenarios:Level 1: Maximum Security (Read-Only)
Level 2: Moderate Security (Safe Edits)
Level 3: Balanced (Most Tools)
Level 4: YOLO (Maximum Productivity)
Next Steps
Tools Overview
Learn about all available tools
MCP Configuration
Configure MCP server permissions