Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.tryvoss.dev/llms.txt

Use this file to discover all available pages before exploring further.

Voss is local-first and repo-scoped. The security model is built around explicit boundaries.

Boundaries

BoundaryPurpose
Permission modesSeparate read-only planning from editing and automation
Cwd jailKeep file access rooted in the selected repository
Edit scopeLimit writes during voss edit
Tool classificationDistinguish read-only and mutating tools
Diff previewShow file changes before risky approvals
Shell allowlistLimit command execution
Session redactionAvoid storing provider credentials
Project memoryKeep VOSS.md and .voss/memory local to the repo
TUI modalsRoute permission and scope decisions through explicit review screens

Scoped writes

voss edit grants write access only to explicit targets and relevant existing tests. Other writes require approval after a diff preview.

Shell execution

Shell execution is mutating and potentially risky. It is denied in edit mode and remains subject to lower-level allowlist behavior in broader modes.

Secrets

Voss sessions must not store provider credentials or API keys.
Do not paste secrets into prompts. Treat user-provided prompt text as session content.

Trust goal

The goal is not to make AI work risk-free. The goal is to make risk visible, bounded, and reviewable before it changes your repo.