Problem
After a recent Claude Code update, every bash command containing quoted characters in flag values triggers a confirmation prompt with the warning:
Command contains quoted characters in flag names
This happens on completely normal commands like git commit -m "message" or bun run build --flag "value". In previous versions, these commands executed without prompts (assuming they matched the allowlist).
Impact
- Breaks existing workflows — commands that previously matched
Bash(git commit *) or Bash(bun run *) allowlist patterns now require manual yes/no confirmation every time.
- Especially disruptive for agentic use — multi-agent orchestration workflows that delegate to subagents are constantly interrupted by these prompts.
- False positive rate is very high — legitimate, safe commands are flagged far more often than actual injection attempts.
Request
Please add one or more of the following:
- A setting to disable this specific check — e.g.,
"disableQuotedCharWarning": true in settings.json
- Respect the existing allowlist — if a command matches an allow pattern, skip the quoted-character check
- Documentation — explain exactly what patterns trigger this warning so users can reformulate commands to avoid it
Environment
- Claude Code (latest, Feb 2026)
- WSL2 / Linux
- Using project-level
settings.json with allowlist + denylist permissions
Current workaround
The only workaround is adding Bash(*) to the allowlist, which defeats the purpose of having granular allow patterns.
Problem
After a recent Claude Code update, every bash command containing quoted characters in flag values triggers a confirmation prompt with the warning:
This happens on completely normal commands like
git commit -m "message"orbun run build --flag "value". In previous versions, these commands executed without prompts (assuming they matched the allowlist).Impact
Bash(git commit *)orBash(bun run *)allowlist patterns now require manual yes/no confirmation every time.Request
Please add one or more of the following:
"disableQuotedCharWarning": trueinsettings.jsonEnvironment
settings.jsonwith allowlist + denylist permissionsCurrent workaround
The only workaround is adding
Bash(*)to the allowlist, which defeats the purpose of having granular allow patterns.