Read-Only Policy
Default Restrictions
Section titled “Default Restrictions”By default, Rally runs Copilot with restricted tools. This is a safety measure that allows Copilot to analyze code without making changes.
Denied Tools (Default)
Section titled “Denied Tools (Default)”bash, edit, create, delete, mv, cpCopilot can:
- ✅ Read files
- ✅ Search code
- ✅ Navigate the codebase
- ✅ Propose changes (in conversation)
Copilot cannot:
- ❌ Edit or create files
- ❌ Run shell commands
- ❌ Delete files
Enabling Write Access
Section titled “Enabling Write Access”Per-Dispatch
Section titled “Per-Dispatch”rally dispatch issue 42 --trustConfiguration
Section titled “Configuration”settings: require_trust: never # Don't ask, always allow writesIn Dashboard
Section titled “In Dashboard”Press a to attach to a session, then respond to the trust prompt.
Custom Tool Restrictions
Section titled “Custom Tool Restrictions”Configure which tools to deny:
settings: deny_tools_copilot: - bash - edit - create deny_tools_sandbox: - bash # More permissive in sandboxNote: Empty arrays are not allowed — defaults will be applied.
Use Cases
Section titled “Use Cases”Read-Only Exploration
Section titled “Read-Only Exploration”Use read-only mode to:
- Understand unfamiliar codebases
- Get code review feedback
- Plan implementation approaches
Trusted Development
Section titled “Trusted Development”Enable write access when:
- Working on your own code
- You’ve reviewed the issue/PR
- You’re ready for Copilot to implement
Security Rationale
Section titled “Security Rationale”Read-only by default because:
- Prevents accidents — Copilot can’t break things without permission
- Enables review — You see proposals before they’re applied
- Builds trust — Start restricted, expand as needed