What’s Protected
Filesystem Destruction
Commands that could delete or corrupt files:rm -rf /and variants targeting critical pathsmkfs— formatting disksdd— raw device writesshred— secure file deletion- Overwriting boot sectors or MBR
System Modification
Commands that alter system configuration:chmod 777— overly permissive file permissionschown root— unauthorized ownership changessysctl— kernel parameter modification- Service management commands that could disable security tools
Database Operations
Destructive database commands:DROP TABLE/DROP DATABASETRUNCATE- Unfiltered
DELETEstatements - Database dump to external locations
Git and Publishing
Dangerous version control and publishing operations:- Force pushes to protected branches
- Publishing packages to registries
- Releasing to package managers
- Clearing command history
Process and Security
Commands that could compromise system security:- Killing security processes
- Disabling firewalls
- Modifying audit configurations
Example
When Claude Code attempts to run a blocked command, Turen intercepts it:Customization
You can adjust command validation rules to fit your workflow:- Disable specific rules if your team routinely uses certain commands in a controlled environment
- Create custom rules to block organization-specific dangerous patterns