---
name: filesystem-mcp-guardrails
description: Use when designing or reviewing filesystem MCP access, path boundaries, allowed roots, method allowlists, and safe local file operations.
---

# Filesystem MCP Guardrails

## Status
This is a conceptual document for a Filesystem MCP server configuration. It is NOT a runnable configuration file. The earlier research used a Go-based filesystem MCP shape; this skill keeps only the safety model.

## Intent
When packaged as a true Agent Powerup, this will provide guidance on configuring and safely running local filesystem MCP servers.

## When to use
Use when the agent needs structured, protocol-driven access to the local filesystem beyond its native capabilities, or when integrating external tools that require filesystem access via MCP.

## Safety Constraints
- MCP servers providing filesystem access MUST be strictly bounded to the intended project directory.
- Avoid configuring MCP servers with root or wide-ranging access.
- Always require user approval before starting a new MCP server.
- Prefer read-only operations until write need is explicit.
- Keep allowlists for roots and methods; avoid broad recursive delete/move surfaces.
- Log configured roots without exposing sensitive path contents.

## Required Shipping Work
Before this becomes a shipped MCP config:
1. Define target-specific config files for Codex, Claude Code, and generic MCP clients.
2. Add `apx mcp check` metadata and dry-run install behavior.
3. Validate path boundary behavior on Windows and POSIX.
4. Add tests for refusal of out-of-root paths and dangerous methods.

## References
- `references/path-boundary-checklist.md`
