feat: add CLAUDE_DANGEROUSLY_SKIP_PERMISSIONS env var support#13
Open
kevinfealey wants to merge 1 commit intoatalovesyou:mainfrom
Open
feat: add CLAUDE_DANGEROUSLY_SKIP_PERMISSIONS env var support#13kevinfealey wants to merge 1 commit intoatalovesyou:mainfrom
kevinfealey wants to merge 1 commit intoatalovesyou:mainfrom
Conversation
Allows skipping CLI permission prompts via environment variable. This is useful when integrating with orchestration layers (like OpenClaw) that already handle their own security controls and permissions. By delegating security to the calling application, the proxy behaves consistently with direct API access where no interactive prompts occur. Set CLAUDE_DANGEROUSLY_SKIP_PERMISSIONS=true to enable.
2c18ed5 to
e5025b8
Compare
bwiedmann
added a commit
to bwiedmann/claude-max-api-proxy
that referenced
this pull request
Feb 15, 2026
…ERMISSIONS env var support # Conflicts: # src/subprocess/manager.ts
3 tasks
Grivn
added a commit
to mnemon-dev/claude-max-api-proxy
that referenced
this pull request
Feb 20, 2026
Fixes applied (from upstream PRs atalovesyou#7, atalovesyou#11, atalovesyou#12, atalovesyou#13, atalovesyou#17, atalovesyou#20): - fix: normalizeModelName crash on undefined model (issue atalovesyou#21) - fix: [object Object] serialization for array content parts - fix: E2BIG error by passing prompt via stdin instead of CLI arg - fix: ensureString on result.result to prevent non-string output - feat: CLAUDE_DANGEROUSLY_SKIP_PERMISSIONS env var for headless mode - feat: OPENCLAW_PROXY=1 env injection for hook isolation - feat: model aliases for claude-*-4-5, claude-*-4-6 generations - feat: claude-proxy/ provider prefix support - feat: developer role support in message conversion - perf: increase subprocess timeout from 5min to 15min Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
chrisle
added a commit
to chrisle/claude-max-api-proxy
that referenced
this pull request
Feb 27, 2026
Users can now send large prompts without E2BIG errors, use array-based content format for multimodal support, properly handle system prompts, and receive token usage data in streaming responses. Model names with any provider prefix are now correctly normalized. Changes: - Fix array content serialization preventing [object Object] bugs - Pass prompts via stdin to prevent E2BIG errors with large requests - Add proper system prompt support via --append-system-prompt flag - Include usage data in final streaming chunks - Support any provider prefix in model names (claude-max/, etc.) - Add CLAUDE_DANGEROUSLY_SKIP_PERMISSIONS env var for service mode - Update to Claude 4.5/4.6 model support Incorporates improvements from PRs atalovesyou#12, atalovesyou#13, atalovesyou#16, atalovesyou#24, atalovesyou#27 at https://github.com/atalovesyou/claude-max-api-proxy
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Purpose
Allows skipping CLI permission prompts via environment variable, enabling seamless integration with orchestration systems.
Use Case
When integrating with orchestration layers (like OpenClaw, custom agents, or automation pipelines) that already implement their own security controls and permission handling, the interactive CLI prompts become a barrier.
By setting
CLAUDE_DANGEROUSLY_SKIP_PERMISSIONS=true, the proxy delegates security responsibility to the calling application, making it behave consistently with direct API access where no interactive prompts occur.Security Considerations
Usage
export CLAUDE_DANGEROUSLY_SKIP_PERMISSIONS=true node dist/server/standalone.js