Operations & Security
Operating mode
Section titled “Operating mode”The current operational mode is chat-first governance with project-local runtime in .s2s.
Supported chat adapters in the CLI surface:
codex-cli(s2s codex-cli)claude-cli(s2s claude-cli)
Critical runtime files
Section titled “Critical runtime files”.s2s/config/runtime.json.s2s/config/llm.json(standalone mode only).s2s/config/execution.templates.json.s2s/project.json
Key operational controls
Section titled “Key operational controls”In runtime.json:
guardrailPolicy(strict|warn|prompt)execution.templateIdexecution.allowedCommandsexecution.timeoutMsexecution.allowUnsafeRawCommandworkspace.projectRepoPathworkspace.worktreesRootPath
In llm.json (standalone mode only):
mode(api|openai_compatible)providermodelapiKeyEnvVar
Recommended production policy
Section titled “Recommended production policy”- Use
guardrailPolicy=strict. - Use strict execution templates (
codex_strict,claude_strict, oropencode_strict). - Keep the command allowlist minimal.
- Keep
allowUnsafeRawCommanddisabled. - Set bounded execution timeouts.
- Keep human approval for merge decisions.
- Enforce branch safety before push: if the current branch is tied to closed/merged PRs, switch to a fresh branch and open a new PR.
- Set release update severity via
S2S_PROJECT_UPDATE_CLASS(softorhard) before shipping.
Governance safety model
Section titled “Governance safety model”- s2s keeps root compatibility shims:
AGENTS.mdCODEX.mdCLAUDE.md
-
s2s maintains canonical project policy in
.s2s/guardrails/.- If root compatibility shims conflict with
.s2s/guardrails/*,.s2s/guardrails/*is the source of truth.
- If root compatibility shims conflict with
-
Config/migration safety:
- backups in
.s2s/backups/ - global snapshots in
~/.s2s/backups/projects/<project-hash>/<snapshot-id>/ - migration logs in
.s2s/logs/ - CLI compatibility checks from
.s2s/project.json
Operational checklist
Section titled “Operational checklist”- Verify the selected chat CLI is installed and authenticated.
- Run
s2s doctorand resolve any strict guardrail discrepancies before stages. - Validate
runtime.jsontemplate and allowlist before execution. - Run
s2s statusbefore critical stage execution. - Ensure
ghis available whenautoPushis enabled (required for PR-state branch safety checks). - Confirm expected project update severity (
soft/hard) for the release and document it in changelog/release notes. - Keep
.s2s/committed or ignored according to your team policy.