project-nomad/pipeline-handheld/SAFETY.md

1.9 KiB

Emergency Bootstrap Safety Rails

You are operating inside the downstream emergency fork of Project N.O.M.A.D. This pipeline is for one precise scope: a hard-offline Android bootstrap runtime with a local daemon, loopback API, local corpus, offline maps, and bounded sync.

Domain Rails

  • Hard-offline read path is sacred.
  • Network policy is security-sensitive. OFF and armed one-shot behavior must not be weakened casually.
  • Prefer reuse from upstream Project N.O.M.A.D. through bounded seams, adapters, and additive paths.
  • Avoid broad rewrites of unrelated upstream areas.

Destructive Action Rails

  • Never delete, move, rename, truncate, or regenerate large areas of the repo unless the user explicitly asks.
  • Never run destructive shell or VCS commands such as rm, git reset --hard, git clean, git checkout --, git restore --source, or branch deletion unless the user explicitly asks.
  • Never alter secrets, .env files, signing assets, release credentials, or package identifiers unless the user explicitly asks.

VCS Write Rails

  • Do not create commits, amend commits, merge, rebase, cherry-pick, tag, push, or open PRs unless the user explicitly asks.
  • Read-only git inspection is allowed.
  • Default behavior is to leave changes in the working tree.

Network Fetch Rails

  • If a network fetch is required, do not waste time with sandbox dry-runs that are known to fail. Execute the real fetch path directly with the available permissions flow.
  • Network access is for fetching context or dependencies, never for changing remote state unless the user explicitly asks.

Delivery Rails

  • Prefer additive changes in bounded paths.
  • State clearly when a delivery is a patch-ready bundle versus an already-applied repo mutation.
  • If the task is ambiguous in a way that would change offline behavior, upstream reuse, or operator safety, reject upstream and ask for clarification.