Voss is local-first and repo-scoped. The security model is built around explicit boundaries.Documentation Index
Fetch the complete documentation index at: https://docs.tryvoss.dev/llms.txt
Use this file to discover all available pages before exploring further.
Boundaries
| Boundary | Purpose |
|---|---|
| Permission modes | Separate read-only planning from editing and automation |
| Cwd jail | Keep file access rooted in the selected repository |
| Edit scope | Limit writes during voss edit |
| Tool classification | Distinguish read-only and mutating tools |
| Diff preview | Show file changes before risky approvals |
| Shell allowlist | Limit command execution |
| Session redaction | Avoid storing provider credentials |
| Project memory | Keep VOSS.md and .voss/memory local to the repo |
| TUI modals | Route permission and scope decisions through explicit review screens |
Scoped writes
voss edit grants write access only to explicit targets and relevant existing tests. Other writes require approval after a diff preview.