Skip to content

Commit 134adbe

Browse files
committed
docs: updated to reflect params used by default
1 parent 9ffca53 commit 134adbe

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/tools/clink.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
The `clink` tool transforms your CLI into a multi-agent orchestrator. Launch isolated Codex instances from _within_ Codex, delegate to Gemini's 1M context, or run specialized Claude agents—all while preserving conversation continuity. Instead of context-switching or token bloat, spawn fresh subagents that handle complex tasks in isolation and return only the results you need.
66

7-
> **CAUTION**: Clink launches real CLI agents with their safety prompts disabled (`--yolo`, `--dangerously-skip-permissions`, `--dangerously-bypass-approvals-and-sandbox`) so they can edit files and run tools autonomously via MCP. If that’s more access than you want, remove those flags—the CLI can still open/read files and report findings, it just won’t auto-apply edits. You can also tighten role prompts or system prompts with stop-words/guardrails, or disable clink entirely. Otherwise, keep the shipped presets confined to workspaces you fully trust.
7+
> **CAUTION**: Clink launches real CLI agents with relaxed permission flags (Gemini ships with `--yolo`, Codex with `--dangerously-bypass-approvals-and-sandbox`, Claude with `--permission-mode acceptEdits`) so they can edit files and run tools autonomously via MCP. If that’s more access than you want, remove those flags—the CLI can still open/read files and report findings, it just won’t auto-apply edits. You can also tighten role prompts or system prompts with stop-words/guardrails, or disable clink entirely. Otherwise, keep the shipped presets confined to workspaces you fully trust.
88
99
## Why Use Clink (CLI + Link)?
1010

@@ -139,7 +139,7 @@ then codereview to verify the implementation"
139139
Clink configurations live in `conf/cli_clients/`. We ship presets for the supported CLIs:
140140

141141
- `gemini.json` – runs `gemini --telemetry false --yolo -o json`
142-
- `claude.json` – runs `claude --print --output-format json --permission-mode bypassPermissions --dangerously-skip-permissions`
142+
- `claude.json` – runs `claude --print --output-format json --permission-mode acceptEdits --model sonnet`
143143
- `codex.json` – runs `codex exec --json --dangerously-bypass-approvals-and-sandbox`
144144

145145
> **CAUTION**: These flags intentionally bypass each CLI's safety prompts so they can edit files or launch tools autonomously via MCP. Only enable them in trusted sandboxes and tailor role prompts or CLI configs if you need more guardrails.

0 commit comments

Comments
 (0)