Edison Watch

Setting Permissions

Configure security policies for tools and resources.

Permissions control how Edison Watch governs AI tool usage. Correct classification is essential for organization security.

Configuration Location

Permissions are set per-server in the Servers page:

  1. Select a server from the sidebar.
  2. Click the Tools tab.

Tools permissions

Security Flags

Each tool has four flags that determine its risk profile:

  • Enabled: Can the tool be used at all?
  • Write Operation: Does it send or modify data externally? (e.g., Slack, Email)
  • Read Private Data: Does it access sensitive internal info? (e.g., Database, Files)
  • Read Untrusted Data: Does it fetch external content? (e.g., Web Fetch)

The Lethal Trifecta

When a session combines Private Data + Untrusted Data + Write Operation, Edison Watch pauses the action for user approval.

ACL Levels

Access Control Levels (ACL) prevent high-sensitivity data from leaking to low-sensitivity destinations:

LevelMeaning
PUBLICNon-sensitive data.
PRIVATEConfidential or internal data.
SECRETHighly sensitive data.

Enforcement: AI cannot flow data from a higher ACL to a lower one (e.g., SECRET → PUBLIC).

Common Patterns

Tool TypePrivateUntrustedWriteACL
File ReadPRIVATE
Web FetchSECRET
MessagingPRIVATE
DatabaseSECRET

Auto-Configuration

Edison Watch can suggest classifications using AI:

  1. Select a server.
  2. Click Auto-Configure.
  3. Review and adjust suggestions as needed.

Always review auto-classifications. Your specific security requirements may vary from the defaults.

Resources & Prompts

The same model applies to MCP resources and prompts via their respective tabs. Use the Enabled toggle to control access.


See the Security Model for a deep dive into the architecture.

On this page