Skip to content

Comments

Allow @-includes outside of workspaces (with permission)#18470

Merged
scidomino merged 2 commits intomainfrom
tomm_ask_at_path
Feb 9, 2026
Merged

Allow @-includes outside of workspaces (with permission)#18470
scidomino merged 2 commits intomainfrom
tomm_ask_at_path

Conversation

@scidomino
Copy link
Collaborator

@scidomino scidomino commented Feb 6, 2026

Summary

Allow @-includes outside of workspaces if the user grants permission.

Details

If a user @-includes a path outside the workspaces, we pop up a UI asking if they want to allow the read:

  • If they do, we allow-list that path for the session (but don't persist it after restart) and process the text like normal
  • If they don't, we process the text like normal, ignoring the files outside the workspace.
Screenshot 2026-02-06 at 12 48 09 PM

Related Issues

Fixes #17135

How to Validate

Attempt to @ include files and folders outside your workspace.

Pre-Merge Checklist

  • Updated relevant documentation and README (if needed)
  • Added/updated tests (if needed)
  • Noted breaking changes (if any)
  • Validated on required platforms/methods:
    • MacOS
      • npm run
      • npx
      • Docker
      • Podman
      • Seatbelt
    • Windows
      • npm run
      • npx
      • Docker
    • Linux
      • npm run
      • npx
      • Docker

@gemini-code-assist
Copy link
Contributor

Summary of Changes

Hello @scidomino, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request introduces a crucial security and usability enhancement by enabling the inclusion of files from outside the configured workspace, but only after explicit user permission. This change provides greater flexibility for users while maintaining control over file access. It also involves a substantial refactoring of the @-command processing pipeline, making it more robust and extensible, and updates core file system access validation to differentiate between read and write permissions.

Highlights

  • External Path Inclusion with User Consent: Introduced a new mechanism that allows users to @-include files located outside their defined workspaces. When such a path is detected, a UI prompt will appear, asking the user for explicit permission to read the file. If granted, the path is temporarily added to a session-specific read-only allow-list.
  • Refactored @-Command Processing Logic: The internal handling of @-commands has been significantly refactored for improved modularity and clarity. This includes new functions for categorizing commands (agents, resources, files), resolving file paths (including globs and ignores), checking permissions, and reconstructing the query for the Language Model.
  • Granular Path Access Validation: The validatePathAccess method in the Config class now supports a checkType parameter ('read' or 'write'), allowing for more granular control over file system operations. Read operations now first check against a new readOnlyPaths list in the WorkspaceContext.
  • Enhanced Workspace Context: The WorkspaceContext now includes a readOnlyPaths set and associated methods (addReadOnlyPath, isPathReadable) to manage paths that are explicitly allowed for reading, even if they are not part of the primary workspace directories.
Changelog
  • packages/cli/src/test-utils/mockConfig.ts
    • Added validatePathAccess to the mock configuration for testing purposes.
  • packages/cli/src/ui/AppContainer.tsx
    • Imported PermissionConfirmationRequest type and checkPermissions utility.
    • Added a new state variable permissionConfirmationRequest to manage UI prompts for external file access.
    • Modified handleFinalSubmit to asynchronously check for required permissions using checkPermissions before submitting a query.
    • Implemented logic to display a permission confirmation prompt if external files are detected and, if allowed, add them to the readOnlyPaths.
    • Updated useCallback dependencies to include config.
    • Changed handleFinalSubmit call to void handleFinalSubmit to handle its new asynchronous nature.
    • Added permissionConfirmationRequest to the conditions that block input and to the uiState dependencies.
  • packages/cli/src/ui/components/DialogManager.tsx
    • Added a new ConsentPrompt component to display and handle permissionConfirmationRequest, presenting a list of external files and asking for user consent.
  • packages/cli/src/ui/contexts/UIStateContext.tsx
    • Imported PermissionConfirmationRequest type.
    • Added permissionConfirmationRequest property to the UIState interface.
  • packages/cli/src/ui/hooks/atCommandProcessor.test.ts
    • Removed assertions related to debug messages for 'Lone @ detected' and updated the debug message for paths not in the workspace.
  • packages/cli/src/ui/hooks/atCommandProcessor.ts
    • Removed unused import DiscoveredMCPResource.
    • Introduced categorizeAtCommands function to separate @ commands into agent, resource, and file types.
    • Added checkPermissions function to identify file paths that require explicit read permission from the user.
    • Refactored handleAtCommand by extracting logic into new helper functions: resolveFilePaths (for globbing, recursion, and ignore handling), constructInitialQuery (for rebuilding the query string), readMcpResources (for MCP resource content), readLocalFiles (for local file content), and reportIgnoredFiles (for logging ignored files).
    • Updated the logic for adding REF_CONTENT_HEADER and REF_CONTENT_FOOTER based on whether content was read from MCP resources or local files.
    • Modified convertResourceContentsToParts to use flatMap for a more concise transformation of resource contents.
  • packages/cli/src/ui/types.ts
    • Defined the PermissionConfirmationRequest interface to structure data for permission prompts.
  • packages/core/src/config/config.ts
    • Modified validatePathAccess to accept an optional checkType parameter ('read' or 'write'), defaulting to 'write'.
    • Implemented logic within validatePathAccess to first check isPathReadable from WorkspaceContext for 'read' operations.
  • packages/core/src/tools/glob.ts
    • Updated calls to validatePathAccess within GlobToolInvocation and GlobTool to explicitly pass 'read' as the checkType.
  • packages/core/src/tools/grep.ts
    • Updated calls to validatePathAccess within GrepToolInvocation and GrepTool to explicitly pass 'read' as the checkType.
  • packages/core/src/tools/ls.ts
    • Updated calls to validatePathAccess within LSToolInvocation and LSTool to explicitly pass 'read' as the checkType.
  • packages/core/src/tools/read-file.ts
    • Updated calls to validatePathAccess within ReadFileToolInvocation and ReadFileTool to explicitly pass 'read' as the checkType.
  • packages/core/src/tools/read-many-files.ts
    • Updated calls to validatePathAccess within ReadManyFilesToolInvocation to explicitly pass 'read' as the checkType.
  • packages/core/src/tools/ripGrep.ts
    • Updated calls to validatePathAccess within GrepToolInvocation and RipGrepTool to explicitly pass 'read' as the checkType.
  • packages/core/src/utils/workspaceContext.ts
    • Added a private readOnlyPaths Set to store paths explicitly allowed for reading.
    • Implemented addReadOnlyPath method to add a given path to the readOnlyPaths set, resolving symlinks.
    • Added isPathReadable method to check if a given path is within the workspace or has been added to the readOnlyPaths set.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@github-actions
Copy link

github-actions bot commented Feb 6, 2026

Size Change: +3.87 kB (+0.02%)

Total Size: 23.9 MB

Filename Size Change
./bundle/gemini.js 23.9 MB +3.87 kB (+0.02%)
ℹ️ View Unchanged
Filename Size
./bundle/sandbox-macos-permissive-closed.sb 1.03 kB
./bundle/sandbox-macos-permissive-open.sb 890 B
./bundle/sandbox-macos-permissive-proxied.sb 1.31 kB
./bundle/sandbox-macos-restrictive-closed.sb 3.29 kB
./bundle/sandbox-macos-restrictive-open.sb 3.36 kB
./bundle/sandbox-macos-restrictive-proxied.sb 3.56 kB

compressed-size-action

Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces a new feature allowing file inclusion via @ commands with user permission. A critical security vulnerability was identified regarding misleading UI behavior with symlinks, which could grant unauthorized access to sensitive files. Resolving symlinks before prompting for user permission is crucial. Additionally, a high-severity issue related to cancellation due to an unpassed AbortSignal needs to be addressed.

@gemini-cli gemini-cli bot added area/core Issues related to User Interface, OS Support, Core Functionality 🔒 maintainer only ⛔ Do not contribute. Internal roadmap item. labels Feb 6, 2026
@scidomino scidomino marked this pull request as ready for review February 6, 2026 21:06
@scidomino scidomino requested a review from a team as a code owner February 6, 2026 21:06
@jacob314 jacob314 self-requested a review February 6, 2026 21:25
@jacob314
Copy link
Contributor

jacob314 commented Feb 6, 2026

🛑 Critical Issues

  • Security Vulnerability (Misleading UI): The checkPermissions function in atCommandProcessor.ts does not resolve symlinks before displaying paths in the permission dialog. A user might approve a seemingly harmless path that actually points to a sensitive file (e.g., ~/.ssh/id_rsa). Symlinks must be resolved via fs.realpath before the user is prompted to ensure transparency.
  • Complete Lack of Tests: No new tests were added for the core permission checking logic (checkPermissions) or the UI integration in AppContainer and DialogManager. New features must include unit tests and, ideally, integration tests using renderWithProviders and waitFor from the project's test utilities.
  • Unaddressed Review Feedback: A previous review mentioned a high-severity issue regarding a missing AbortSignal. The checkPermissions function is asynchronous but does not accept an AbortSignal, which could lead to race conditions if the user cancels or submits a new prompt before the check completes.

🛠 Technical & Style Issues

  • Conventional Commits Violation: The PR title "Allow @-includes outside of workspaces (with permission)" does not follow the project's Conventional Commits standard (e.g., it should be feat(core): ... or feat(cli): ...).
  • Synchronous I/O in UI Path: WorkspaceContext.addReadOnlyPath uses fs.existsSync and fs.realpathSync. Since this is called from the React handleFinalSubmit workflow, it can cause the CLI UI to hang on slow file systems.
  • Inconsistent React Patterns:
    • In AppContainer.tsx, handleFinalSubmit is now async. When called inside useEffect, it uses the void operator, which can lead to unhandled rejections if the component unmounts while the permissions check is still in flight.
    • In handleFinalSubmit, addInput(submittedValue) is called inconsistently (once before the early return for permissions and again at the end of the function).

This review was authored by Review Frontend and reviewed by Jacob.

@scidomino scidomino force-pushed the tomm_ask_at_path branch 2 times, most recently from 7c827e5 to 1b2e887 Compare February 8, 2026 01:32
Copy link
Collaborator Author

@scidomino scidomino left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The abort signal issue is addressed in: #18477

Also added some tests.

Copy link
Contributor

@jacob314 jacob314 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@scidomino scidomino enabled auto-merge February 9, 2026 19:56
@scidomino scidomino disabled auto-merge February 9, 2026 20:23
@scidomino scidomino merged commit 262e838 into main Feb 9, 2026
25 checks passed
@scidomino scidomino deleted the tomm_ask_at_path branch February 9, 2026 20:24
krsjenmt added a commit to krsjenmt/gemini-cli that referenced this pull request Feb 11, 2026
* Fix newline insertion bug in replace tool (google-gemini#18595)

* fix(evals): update save_memory evals and simplify tool description (google-gemini#18610)

* chore(evals): update validation_fidelity_pre_existing_errors to USUALLY_PASSES (google-gemini#18617)

* fix: shorten tool call IDs and fix duplicate tool name in truncated output filenames (google-gemini#18600)

* feat(cli): implement atomic writes and safety checks for trusted folders (google-gemini#18406)

* Remove relative docs links (google-gemini#18650)

* docs: add legacy snippets convention to GEMINI.md (google-gemini#18597)

* fix(chore): Support linting for cjs (google-gemini#18639)

Co-authored-by: Gal Zahavi <38544478+galz10@users.noreply.github.com>

* feat: move shell efficiency guidelines to tool description (google-gemini#18614)

* Added "" as default value, since getText() used to expect a string only and thus crashed when undefined...  Fixes google-gemini#18076   (google-gemini#18099)

* Allow @-includes outside of workspaces (with permission) (google-gemini#18470)

* chore: make `ask_user` header description more clear (google-gemini#18657)

* bug(core): Fix minor bug in migration logic. (google-gemini#18661)

* Harded code assist converter. (google-gemini#18656)

* refactor(core): model-dependent tool definitions (google-gemini#18563)

* feat: enable plan mode experiment in settings (google-gemini#18636)

* refactor: push isValidPath() into parsePastedPaths() (google-gemini#18664)

* fix(cli): correct 'esc to cancel' position and restore duration display (google-gemini#18534)

* feat(cli): add DevTools integration with gemini-cli-devtools (google-gemini#18648)

* chore: remove unused exports and redundant hook files (google-gemini#18681)

* Fix number of lines being reported in rewind confirmation dialog (google-gemini#18675)

* feat(cli): disable folder trust in headless mode (google-gemini#18407)

* Disallow unsafe type assertions (google-gemini#18688)

* Change event type for release (google-gemini#18693)

* feat: handle multiple dynamic context filenames in system prompt (google-gemini#18598)

* Properly parse at-commands with narrow non-breaking spaces (google-gemini#18677)

* refactor(core): centralize core tool definitions and support model-specific schemas (google-gemini#18662)

* feat(core): Render memory hierarchically in context. (google-gemini#18350)

* feat: Ctrl+O to expand paste placeholder (google-gemini#18103)

* fix(cli): Improve header spacing (google-gemini#18531)

* Feature/quota visibility 16795 (google-gemini#18203)

* docs: remove TOC marker from Plan Mode header (google-gemini#18678)

* Inline thinking bubbles with summary/full modes (google-gemini#18033)

Co-authored-by: Jacob Richman <jacob314@gmail.com>

* fix(ui): remove redundant newlines in Gemini messages (google-gemini#18538)

* test(cli): fix AppContainer act() warnings and improve waitFor resilience (google-gemini#18676)

* refactor(core): refine Security & System Integrity section in system prompt (google-gemini#18601)

* Fix layout rounding. (google-gemini#18667)

* docs(skills): enhance pr-creator safety and interactivity (google-gemini#18616)

* test(core): remove hardcoded model from TestRig (google-gemini#18710)

* feat(core): optimize sub-agents system prompt intro (google-gemini#18608)

* feat(cli): update approval mode labels and shortcuts per latest UX spec (google-gemini#18698)

* fix(plan): update persistent approval mode setting (google-gemini#18638)

Co-authored-by: Sandy Tao <sandytao520@icloud.com>

* fix: move toasts location to left side (google-gemini#18705)

* feat(routing): restrict numerical routing to Gemini 3 family (google-gemini#18478)

* fix(ide): fix ide nudge setting (google-gemini#18733)

* fix(core): standardize tool formatting in system prompts (google-gemini#18615)

* chore: consolidate to green in ask user dialog (google-gemini#18734)

* feat: add `extensionsExplore` setting to enable extensions explore UI. (google-gemini#18686)

* feat(cli): defer devtools startup and integrate with F12 (google-gemini#18695)

* ui: update & subdue footer colors and animate progress indicator (google-gemini#18570)

* test: add model-specific snapshots for coreTools (google-gemini#18707)

Co-authored-by: matt korwel <matt.korwel@gmail.com>

* ci: shard windows tests and fix event listener leaks (google-gemini#18670)

* fix: allow `ask_user` tool in yolo mode (google-gemini#18541)

* feat: redact disabled tools from system prompt (google-gemini#13597) (google-gemini#18613)

* Update Gemini.md to use the curent year on creating new files (google-gemini#18460)

* Code review cleanup for thinking display (google-gemini#18720)

* fix(cli): hide scrollbars when in alternate buffer copy mode (google-gemini#18354)

Co-authored-by: Jacob Richman <jacob314@gmail.com>

* Fix issues with rip grep (google-gemini#18756)

* fix(cli): fix history navigation regression after prompt autocomplete (google-gemini#18752)

* chore: cleanup unused and add unlisted dependencies in packages/cli (google-gemini#18749)

* Fix issue where Gemini CLI creates tests in a new file (google-gemini#18409)

* feat(telemetry): Ensure experiment IDs are included in OpenTelemetry logs (google-gemini#18747)

* feat(ux): added text wrapping capabilities to markdown tables (google-gemini#18240)

Co-authored-by: jacob314 <jacob314@gmail.com>

* Revert "fix(mcp): ensure MCP transport is closed to prevent memory leaks" (google-gemini#18771)

* chore(release): bump version to 0.30.0-nightly.20260210.a2174751d (google-gemini#18772)

* chore: cleanup unused and add unlisted dependencies in packages/core (google-gemini#18762)

* chore(core): update activate_skill prompt verbiage to be more direct (google-gemini#18605)

* Add autoconfigure memory usage setting to the dialog (google-gemini#18510)

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* fix(core): prevent race condition in policy persistence (google-gemini#18506)

Co-authored-by: Allen Hutchison <adh@google.com>

* fix(evals): prevent false positive in hierarchical memory test (google-gemini#18777)

* test(evals): mark all `save_memory` evals as `USUALLY_PASSES` due to unreliability (google-gemini#18786)

* feat(cli): add setting to hide shortcuts hint UI (google-gemini#18562)

* feat(core): formalize 5-phase sequential planning workflow (google-gemini#18759)

* Introduce limits for search results. (google-gemini#18767)

---------

Co-authored-by: Andrew Garrett <andrewgarrett@google.com>
Co-authored-by: N. Taylor Mullen <ntaylormullen@google.com>
Co-authored-by: Sandy Tao <sandytao520@icloud.com>
Co-authored-by: Gal Zahavi <38544478+galz10@users.noreply.github.com>
Co-authored-by: christine betts <chrstn@uw.edu>
Co-authored-by: Aswin Ashok <aswwwin@google.com>
Co-authored-by: Abhijith V Ashok <abhi2349jith@gmail.com>
Co-authored-by: Tommaso Sciortino <sciortino@gmail.com>
Co-authored-by: Jack Wotherspoon <jackwoth@google.com>
Co-authored-by: joshualitt <joshualitt@google.com>
Co-authored-by: Jacob Richman <jacob314@gmail.com>
Co-authored-by: Aishanee Shah <aishaneeshah@gmail.com>
Co-authored-by: Jerop Kipruto <jerop@google.com>
Co-authored-by: Adib234 <30782825+Adib234@users.noreply.github.com>
Co-authored-by: Christian Gunderman <gundermanc@gmail.com>
Co-authored-by: g-samroberts <158088236+g-samroberts@users.noreply.github.com>
Co-authored-by: Spencer <spencertang@google.com>
Co-authored-by: Dmitry Lyalin <dmitry.lyalin@lyalin.com>
Co-authored-by: matt korwel <matt.korwel@gmail.com>
Co-authored-by: Shreya Keshive <shreyakeshive@google.com>
Co-authored-by: Sri Pasumarthi <111310667+sripasg@users.noreply.github.com>
Co-authored-by: Keith Guerin <keithguerin@gmail.com>
Co-authored-by: Sehoon Shon <sshon@google.com>
Co-authored-by: Adam Weidman <65992621+adamfweidman@users.noreply.github.com>
Co-authored-by: Kevin Ramdass <ramdass.kevin@gmail.com>
Co-authored-by: Dev Randalpura <devrandalpura@google.com>
Co-authored-by: gemini-cli-robot <gemini-cli-robot@google.com>
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
Co-authored-by: Brad Dux <959674+braddux@users.noreply.github.com>
Co-authored-by: Allen Hutchison <adh@google.com>
Co-authored-by: Abhijit Balaji <abhijitbalaji@google.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/core Issues related to User Interface, OS Support, Core Functionality 🔒 maintainer only ⛔ Do not contribute. Internal roadmap item.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Ask users if it's ok to read @-paths outside the workspace

2 participants