Deny rules prevent potentially dangerous commands from being executed. Verdent blocks most dangerous commands by default, but you can add additional rules.Access: Settings → Permissions → Deny RulesEnter one rule per line. Deny rules take precedence over allow rules.Rule Syntax:
Use * as a wildcard to match any characters
Rules are case-sensitive
Each line represents a separate rule
Empty lines are ignored
Common Patterns:
Pattern
Purpose
rm -rf /*
Prevent recursive deletion from root
curl * | *sh*
Block piping downloaded scripts to shell
dd * of=/dev/sd*
Prevent disk overwrite operations
When Verdent attempts to execute a command that matches a deny rule, it will be blocked for your safety.
Model Context Protocol (MCP) is an open protocol that standardizes how applications provide context to LLMs. MCP servers are executables that implement the protocol. They’re not database connections or API endpoints, but programs that run and communicate via JSON-RPC 2.0.Key Concepts:
MCP Servers: Executables (Node.js packages, Python scripts, etc.) that implement the MCP protocol
Configuration: Settings → MCP Servers defines how to start each server
Tools: MCP servers provide tools that Verdent can use during conversations
Commit to version control for team-wide consistency:
# AGENTS.md## Code Review Process- Run Code Review before PR (Settings → Auto Generate Code Review)- Address all security warnings- Minimum 80% test coverage## Database Changes- Review migrations for destructive operations- Test on staging before production## MCP Server Usage- Use postgres-staging for queries- Never use postgres-prod for exploratory queries