Discover
Find project-level and global config files where persistent trust is stored.
Baymax scans AI coding agent configs for dangerous "always allow" settings before they become long-lived trust debt across shell access, filesystem writes, network permissions, and MCP integrations.
It normalizes each agent's config shape into a common risk model, so findings are comparable across teams and tools.
Aider| Agent | Signals Baymax scans |
|---|---|
| Claude Code | allowedTools, permissions.allow, MCP server permissions and env-secret exposure |
| Cursor | permissions.allow, trustedPaths |
| Codex CLI | approval_policy: auto, full_auto: true, sandbox.enabled: false |
| Gemini CLI | trustedFolders, sandboxEnabled: false, MCP server trust |
| GitHub Copilot | permanentlyTrustedDirectories, networkAccess: true |
| Aider | yes: true, auto-commits: true, shell: true |
Find project-level and global config files where persistent trust is stored.
Map each permission to a rule, assign risk, and escalate when persistence + global scope increase impact.
baymax fix opens interactive cleanup: medium/high prechecked, low optional.
Install from npm, then run locally or in CI.
npm install -g baymax-cli
baymax scan .
baymax scan . --depth 3
baymax scan . --json
baymax fix .
baymax export --md --output ./security-report.md
Baymax audits capabilities, not intent. It scores what the permission enables.
Install Baymax in under a minute and audit your AI coding agent permissions locally.
npm install -g baymax-cli
baymax scan .