Modes as Workflow Levers
Most engineers pick a permission mode once and forget about it. But switching modes mid-session — via Shift+Tab — is a workflow optimization tool.| Mode | What it does | When to use |
|---|---|---|
| Normal | Asks for approval on most tool calls | Early exploration, unfamiliar code, high-risk changes |
| Auto-accept | Approves safe operations automatically | Active implementation after you’ve validated the approach |
| Plan | Claude plans but doesn’t execute until you approve | Architecture decisions, risky refactors, database changes |
| Don’t ask | Like auto-accept but suppresses all prompts | Background agents, CI/CD, well-defined tasks with strong hooks |
| Bypass permissions | No restrictions at all | Containers only. Never on your host machine. |
The Trust Progression
Permission modes map to trust — and trust should increase as guardrails do:Modes and Multi-Agent Work
For Agent Teams and subagents, permission modes interact:- Teammates inherit the lead’s permission mode by default
- Subagents can be spawned with explicit modes via the
modeparameter - Background agents prompt for permissions before launching — set to
dontAskif your hooks handle safety
dontAsk mode with hooks providing the safety layer.
Sandboxing for Autonomous Work
When running agents withdontAsk or bypassPermissions, sandboxing provides the safety net that permissions would normally give. The tradeoff: you lose fine-grained control but gain a hard boundary that can’t be bypassed by prompt injection.
| Layer | What it restricts |
|---|---|
| Filesystem sandbox | Read/write only within project directory |
| Network sandbox | Outbound only to allowed domains |
| Container isolation | Full OS-level boundary (Docker, devcontainers) |
dontAsk + OS-level sandboxing + stop hooks is the production-grade safety stack.
← Prev: Agent Teams · Next: Cost & Model Routing →