BACK_TO_FEEDAICRIER_2
Unsafe bash approval exposes Copilot CLI risk
OPEN_SOURCE ↗
REDDIT · REDDIT// 4h agoSECURITY INCIDENT

Unsafe bash approval exposes Copilot CLI risk

A Reddit user says a terminal-based coding agent repeatedly mangled chained bash commands, created a mess of bad directories, and then proposed a “fix” that included `rm -rf`, which slipped past approval. The incident happened inside an isolated Proxmox VM, so the damage was contained to the project, but it still served as a sharp reminder that shell-enabled agents need hard sandboxing, careful review, and narrow command scopes.

// ANALYSIS

Hot take: this is less about “bad AI” and more about how quickly a terminal agent becomes dangerous when the approval UX is too trusting.

  • One mistaken approval in a shell session can do real damage faster than most code-review workflows can catch it.
  • The failure mode is compounded by retries, bad escaping, and agents trying to self-correct with destructive commands.
  • The thread mirrors a broader pattern in terminal agents like Copilot CLI, Codex, and Claude Code: productivity jumps, but so does blast radius.
  • Isolation helped here, but the post makes a strong case for per-task sandboxes, least-privilege access, and stricter command confirmation.
// TAGS
github-copilot-cliai-codingcoding-agentclisecuritybashsandboxingsafetyterminal

DISCOVERED

4h ago

2026-05-03

PUBLISHED

5h ago

2026-05-03

RELEVANCE

8/ 10

AUTHOR

TheQuantumPhysicist