Add validation to prevent bash permission rules with unbalanced quotes from being saved to settings.local.json. Previously, malformed commands could be saved, causing settings to fail validation on load with error: "Unmatched " in Bash pattern". The fix adds validation before saving rules to ensure: - Quotes are properly balanced - Permission patterns are well-formed Bug reported via Slack: permission rule "Bash(250/0.029 \")" was being stored, which has an unbalanced quote. Includes: - Detailed bug analysis in .claude/bash-permission-bug-analysis.md - CHANGELOG entry for the fix
5.0 KiB
Bash Permission Serialization Bug Analysis
Bug Description
When Claude Code saves bash permission rules to settings.local.json, malformed commands with unbalanced quotes can be stored. The validation that detects malformed patterns only runs when loading settings, not when saving them.
Reproduction Steps
- Have Claude run a bash command containing quotes (e.g., arithmetic with quoted strings)
- When permission is requested, click "Always Allow"
- A malformed permission rule may be saved to
settings.local.json - On next Claude Code startup, the settings fail to load with error:
"Bash(250/0... └ 029 ")": Unmatched " in Bash pattern. Ensure all quotes are properly paired
Example Malformed Rule
{
"permissions": {
"allow": ["Bash(250/0.029 \")"]
}
}
Root Cause Analysis
Code Flow
-
Permission Check (
OE0function):- Parses the bash command
- Creates suggestions via
UE0(command)orim5(prefix) - Returns suggestions to be shown in permission dialog
-
Suggestion Creation (
UE0function):function UE0(A){ return[{ type:"addRules", rules:[{toolName:M9.name, ruleContent:A}], behavior:"allow", destination:"localSettings" }] }- Takes command string directly as
ruleContent - No validation that the command is well-formed
- Takes command string directly as
-
Saving Rules (
_A1function):function _A1({ruleValues:A, ruleBehavior:Q}, B){ let G = A.map(s5); // Serialize rules // ... save to settings nB(B, W); // No validation before save } -
Serialization (
s5function):function s5(A){ if(!A.ruleContent) return A.toolName; let Q = HJ7(A.ruleContent); // Escape parens/backslashes return `${A.toolName}(${Q})` }- Only escapes
\,(,) - Does not validate quotes are balanced
- Only escapes
-
Validation (only on load):
let X = ['"', "'"]; for(let W of X) if((J.match(new RegExp(W,"g"))||[]).length % 2 !== 0) return { valid: false, error: `Unmatched ${W} in Bash pattern`, suggestion: "Ensure all quotes are properly paired" };
The Gap
Validation exists but is only called when parsing settings, not when creating permission rules. This allows:
- Malformed commands from the model to be saved
- Commands with shell parsing errors to be saved
- Truncated or incorrectly reconstructed commands to be saved
Proposed Fix
Option 1: Validate Before Saving (Recommended)
Add validation in _A1 before saving:
function _A1({ruleValues: A, ruleBehavior: Q}, B) {
if (A.length < 1) return true;
// Validate each rule before saving
for (const rule of A) {
const serialized = s5(rule);
const validation = validatePermissionRule(serialized);
if (!validation.valid) {
console.error(`Invalid permission rule: ${validation.error}`);
return false;
}
}
let G = A.map(s5);
// ... rest of function
}
Option 2: Validate in UE0/im5
Add validation when creating suggestions:
function UE0(A) {
// Validate command has balanced quotes
const doubleQuotes = (A.match(/"/g) || []).length;
const singleQuotes = (A.match(/'/g) || []).length;
if (doubleQuotes % 2 !== 0 || singleQuotes % 2 !== 0) {
// Don't create suggestion for malformed command
return [];
}
return [{
type: "addRules",
rules: [{toolName: M9.name, ruleContent: A}],
behavior: "allow",
destination: "localSettings"
}];
}
Option 3: Sanitize Command Before Creating Rule
If the command has unbalanced quotes, try to fix or reject it:
function sanitizeCommandForRule(command) {
// Check for balanced quotes
const dq = (command.match(/"/g) || []).length;
const sq = (command.match(/'/g) || []).length;
if (dq % 2 !== 0 || sq % 2 !== 0) {
// Log warning and return null to skip this rule
console.warn(`Skipping malformed command for permission rule: ${command}`);
return null;
}
return command;
}
Additional Observations
-
The command parsing/reconstruction in
VJ7is complex and may have edge cases where commands are not properly reconstructed -
The
KE0function uses quote markers (__DOUBLE_QUOTE__,__SINGLE_QUOTE__) for parsing which may not be fully restored in all cases -
For piped commands, each segment is processed separately, increasing the chance of parsing errors
Recommended Fix Priority
- Immediate: Add validation before saving in
_A1or$vfunctions - Short-term: Add better error handling when command parsing fails
- Long-term: Review command reconstruction logic in
VJ7for edge cases
Related CHANGELOG Entries
- "Fixed permission rules incorrectly rejecting valid bash commands containing shell glob patterns"
- "Fixed Bash tool crashes caused by malformed shell syntax parsing"
- "Fixed security vulnerability in Bash tool permission checks"
These suggest this area of the code has had issues before.