AI Development11 min read

Claude Code Auto Mode: Autonomous Permission Guide

Claude Code Auto Mode lets AI make permission decisions without prompts. How it works, risk boundaries, and best practices for safe autonomous coding.

Digital Applied Team
March 24, 2026
11 min read
Mar 24

Release Date

3

Permission Tiers

11 min

Reading Time

100%

Audit Logged

Key Takeaways

Auto mode is a research preview, not a production feature: Released on March 24, 2026, Claude Code Auto Mode is an experimental capability that lets the safety classifier decide whether to approve or deny file reads, terminal commands, and edits autonomously. Anthropic labels it a research preview, meaning the permission logic is still being refined and behavior may change between releases.
A safety classifier replaces per-action confirmation prompts: Instead of pausing for every tool call, Auto Mode routes each proposed action through a built-in safety classifier that evaluates the action against the active permission policy, the current working directory, and the .claudeignore file. Only actions the classifier scores as safe within policy proceed without user input.
Three permission tiers give granular control over autonomy scope: The permissive tier approves most file operations within the project directory. The balanced tier adds confirmation for network calls and system path writes. The restrictive tier only permits reads and in-project edits. Choosing the right tier is the most important configuration decision when enabling auto mode.
Pairing auto mode with .claudeignore and audit logs is mandatory: Anthropic strongly recommends creating a .claudeignore file at the project root to block access to credentials, environment files, and sensitive directories before enabling auto mode. Audit logging records every autonomous action and is the primary tool for reviewing what the model did during an unattended session.

Every developer who has used Claude Code knows the rhythm: propose an action, wait for approval, proceed, repeat. That rhythm protects against mistakes but also interrupts flow, especially on repetitive tasks like refactoring large codebases, running test suites, or installing dependencies. Claude Code Auto Mode, released on March 24, 2026 as a research preview, breaks that rhythm by replacing per-action confirmation prompts with a safety classifier that evaluates and approves actions autonomously.

The shift is significant. Rather than acting as a co-pilot that waits for clearance at every turn, Claude Code in auto mode behaves more like a supervised autonomous agent: it reads the permission policy you have set, consults the .claudeignore file for exclusions, and proceeds through multi-step tasks without interruption. This guide covers how the safety classifier works, the three permission tiers, and the safeguards that prevent the autonomy from becoming a liability. For context on how AI and digital transformation tools like Claude Code fit into modern development workflows, the trend is clear: autonomous capability needs auditable boundaries.

What Is Claude Code Auto Mode

Claude Code Auto Mode is an experimental feature that changes how Claude handles the tool-use approval loop. In standard mode, every file read, terminal command, and edit requires explicit user confirmation. Auto mode replaces that confirmation gate with a built-in safety classifier that evaluates each proposed action in real time and decides whether to approve or deny it autonomously, based on the permission policy you have configured.

The feature was released on March 24, 2026 as a research preview. Anthropic uses the research preview label deliberately: the classifier's decision logic is still being refined, behavior may change between releases, and the feature is not yet recommended for use on shared team environments without additional safeguards. That said, the architecture is fully functional and already accelerates solo development workflows substantially.

Safety Classifier

A dedicated model trained to evaluate each Claude Code tool call against the active permission policy, enforcing scope boundaries without requiring user input.

Three Tiers

Permissive, balanced, and restrictive tiers give granular control over which action types are auto-approved and which still surface a confirmation prompt.

Audit Logging

Every autonomous action is written to a structured audit log. Reviewing the log before committing changes is the primary oversight mechanism for unattended sessions.

The core value proposition is uninterrupted execution of multi-step tasks. Consider a refactoring session that requires reading 40 files, updating import paths, running a type checker, fixing the reported errors, and running tests. In standard mode that sequence involves dozens of approval prompts. In auto mode on the balanced tier, the entire workflow runs continuously unless the model needs to perform an action outside the approved scope, such as installing a new package or writing to a config file outside the project root.

The Safety Classifier and Research Preview

The safety classifier is the technical heart of auto mode. It is a separate model, distinct from the Claude model handling the coding task, trained specifically to evaluate tool call requests against a defined permission schema. When Claude Code proposes an action in auto mode, the classifier receives the action type, the target path or command, the current working directory, and the active permission policy, and returns an approve, deny, or escalate decision within milliseconds.

The research preview designation reflects two things: the classifier is not yet fully aligned across all edge cases, and Anthropic is collecting data on how developers configure and use auto mode to inform improvements. Developers using the research preview should expect occasional over-approvals in permissive mode and over-denials in restrictive mode as the classifier calibration is refined.

How the Classifier Evaluates Each Action
1

Path Scope Check

Is the target file or directory within the allowed scope defined by the permission tier and project root?

2

Operation Type Check

Is the action type (read, write, delete, execute) permitted at the current tier for this path category?

3

.claudeignore Pattern Match

Does the target path match any glob pattern in the project .claudeignore file? If yes, deny regardless of tier.

4

Decision and Logging

Approve, deny, or escalate to user. All decisions are written to the audit log with timestamp, action type, path, and classifier verdict.

Three Permission Tiers Explained

The permission tier is the most important configuration decision when enabling auto mode. Each tier defines a different balance between autonomy and oversight. Choosing a tier that is too permissive creates risk; choosing one that is too restrictive defeats the purpose of auto mode by generating too many escalation prompts.

Permissive Tier

Auto-approves most file reads and writes within the project directory, running standard development commands (npm install, tsc, jest), and creating new files. Network requests and system path writes are escalated.

Best for: Solo developers working on trusted personal projects in isolated environments.

Balanced Tier (Recommended)

Auto-approves in-project file reads, edits, and build commands. Escalates network calls, writes to paths outside the project root, and commands that modify global configuration. The default for new auto mode activations.

Best for: Most development workflows. Provides meaningful autonomy while adding confirmation gates for higher-risk operations.

Restrictive Tier

Auto-approves only file reads and in-project edits to existing files. All terminal commands, new file creations, and any writes outside the current directory require explicit confirmation.

Best for: Auditing unfamiliar codebases, onboarding sessions, or any context where you want read-heavy automation without write risk.

Tier selection applies at the session level. You can switch tiers mid-session by updating the permission policy, though Anthropic recommends setting the tier before starting a long autonomous task rather than changing it while the model is mid-execution. The balanced tier is the default for a reason: it captures the majority of productivity gains from auto mode while maintaining meaningful oversight on the operations most likely to have unintended side-effects.

Enabling Auto Mode and Configuration

Auto mode is enabled through the Claude Code settings interface or via a command-line flag. The recommended approach is to configure the permission policy and .claudeignore file before activating auto mode, not after. Enabling auto mode on a project without these safeguards in place removes the human approval loop before the safety boundaries are defined.

Auto Mode Activation Commands

Enable auto mode with balanced tier (recommended)

claude --auto-mode --permission-tier balanced

Enable with permissive tier (trusted personal project)

claude --auto-mode --permission-tier permissive

Enable with restrictive tier (read-heavy audit mode)

claude --auto-mode --permission-tier restrictive

Enable with audit log output to file

claude --auto-mode --audit-log ./claude-audit.jsonl

The permission policy can also be defined in a .claude/policy.json file at the project root. This approach is preferred for team environments because the policy file is version-controlled alongside the code, making the autonomy boundaries explicit and reviewable. The JSON policy schema supports custom allow and deny patterns beyond the three tiers, enabling fine-grained control for specific directories or file types within a project. For those also exploring how to customize Claude for business workflows, the policy file approach integrates naturally with broader personalization settings.

.claudeignore, Audit Logging, and Safeguards

The two most important safeguards for auto mode are the .claudeignore file and audit logging. Together they provide defensive depth: the ignore file prevents the classifier from ever approving access to sensitive paths, and the audit log creates a complete record of everything the model did autonomously during the session.

Example .claudeignore File
# Environment and credentials .env .env.* .env.local credentials/ secrets/ *.pem *.key # Build artifacts .next/ dist/ build/ # Package lock files (prevent dep changes) package-lock.json pnpm-lock.yaml # Git internals .git/

The .claudeignore file uses gitignore glob syntax and is evaluated by the classifier before the permission tier check. A path that matches an ignore pattern is denied regardless of whether the tier would otherwise approve it. This makes the ignore file the highest-priority safety boundary in auto mode, even more important than the tier selection.

Audit logging writes a structured .jsonl file with one entry per classifier decision. Each entry includes a timestamp, the action type, the full target path, the classifier verdict (approved, denied, or escalated), and the permission tier that was active at the time. Reviewing the audit log is the correct workflow for verifying what happened during an unattended auto mode session before committing or merging the resulting changes.

Real-World Use Cases and Acceleration

Auto mode delivers the most value on tasks that involve many sequential, predictable operations within a well-scoped project directory. The following use cases represent where developers report the clearest productivity gains.

Large-Scale Refactoring

Renaming imports across a large codebase, migrating from one library to another, or updating API call patterns across dozens of files. Auto mode eliminates approval prompts for each file read and edit, reducing a two-hour interruption-heavy session to a continuous unattended run.

Test-Fix Loops

Run tests, read failure output, fix the failing files, run tests again. In balanced auto mode, the entire cycle runs without interruption as long as fixes stay within the project directory. Type checking and lint fix cycles follow the same pattern.

Documentation Generation

Reading source files and writing JSDoc comments, README sections, or API reference docs. In restrictive mode with edits to existing doc files permitted, the model can update documentation across the entire codebase autonomously.

Codebase Auditing

Using restrictive auto mode to read through a large unfamiliar codebase and produce a structured analysis without making any changes. The model can traverse hundreds of files and generate findings without any approval prompts.

These patterns share a common characteristic: the task is well-defined, the scope is bounded to a single project directory, and the expected operations are repetitive reads and targeted edits. Auto mode is less suited for exploratory tasks where the model might need to install new dependencies, call external APIs, or create files in locations that are not predictable upfront. For those tasks, standard mode with occasional approvals remains the better approach. Teams already using Claude Dispatch for remote task delegation can combine it with auto mode to send well-scoped tasks from a mobile device and let the model execute autonomously while away from the machine.

Risk Boundaries and What Auto Mode Cannot Do

Understanding the boundaries of auto mode is as important as understanding its capabilities. The safety classifier enforces hard limits that cannot be overridden through tier selection or policy configuration, regardless of how the user has configured the permission policy.

The hard limits reflect Anthropic's risk model for autonomous operation: the most dangerous category is operations that are difficult or impossible to reverse. Deleting a directory, truncating a database, or overwriting a production configuration file are in a different risk category than editing a source file, even if both happen without user confirmation. The classifier is calibrated to treat irreversibility as the primary risk signal, more important than operation type or target path.

Best Practices for Teams and Enterprises

Auto mode is currently a research preview, and Anthropic has not yet published formal enterprise guidance. Based on how the feature works and the risk model embedded in the classifier, the following practices represent a sensible approach for teams considering adoption.

Version Control the Policy

Commit .claude/policy.json and .claudeignore to the repository. This makes the autonomy boundaries visible in code review and ensures all developers on the project use the same permission configuration.

Review Audit Logs Before Merging

Establish a team norm of reviewing the auto mode audit log as part of the PR review process. The log is the ground truth for what the model did autonomously and should be treated with the same scrutiny as the code diff.

Start with Restrictive in New Repos

When applying auto mode to a codebase for the first time, start with the restrictive tier to build confidence in how the model behaves on that specific project before upgrading to balanced or permissive.

Never Use Permissive on Shared Repos

The permissive tier is appropriate for solo personal projects only. On any repository with multiple contributors, use balanced or restrictive. The broader the blast radius of an unexpected autonomous action, the more conservative the tier should be.

Comparing Manual and Auto Mode Workflows

The practical difference between manual and auto mode is most visible on multi-step tasks. A manual session refactoring a 200-file TypeScript codebase to update import paths might require 80 to 120 approval prompts over 45 minutes. The same task in balanced auto mode runs in 8 to 12 minutes with zero interruptions, assuming all operations stay within the project directory.

Manual vs Auto Mode: Key Differences
DimensionManual ModeAuto Mode (Balanced)
Approval promptsEvery tool callNetwork + out-of-scope only
Execution speedHuman-pacedModel-paced (much faster)
Oversight mechanismReal-time approvalPost-session audit log
Best forExploratory, unpredictable tasksRepetitive, scoped workflows

The oversight model fundamentally changes between the two modes: manual mode is real-time oversight, while auto mode is retrospective oversight via the audit log. For developers comfortable with the audit-based model, the productivity gains are substantial. For those who prefer to understand each action as it happens, manual mode remains the correct default. The right choice depends on the task, the project, and the developer's trust in the permission configuration they have set up. Auto mode is not a replacement for manual mode; it is a complement that accelerates specific categories of well-scoped work. As Anthropic refines the research preview and the classifier matures, the line between the two modes will likely continue to shift.

Conclusion

Claude Code Auto Mode represents a meaningful architectural shift in how AI coding assistants handle the permission problem. Rather than treating every action as equally risky and requiring manual approval, the safety classifier evaluates each action against a defined policy and resolves the vast majority of decisions autonomously. The result is a coding assistant that can execute multi-step tasks at model speed without constant interruption.

The research preview label is a genuine caution. The classifier is not yet fully calibrated, the permission tier boundaries will evolve, and Anthropic is still learning how developers use autonomous mode in practice. The developers who will benefit most from the current state are those willing to invest in proper configuration: a carefully crafted .claudeignore file, the balanced permission tier, and consistent audit log review before committing autonomous changes. With those safeguards in place, auto mode is already one of the most compelling productivity improvements in the Claude Code feature set.

Ready to Build with Autonomous AI?

Autonomous AI coding tools like Claude Code Auto Mode are one part of a broader AI transformation strategy. Our team helps businesses design, implement, and govern AI-assisted workflows that deliver measurable results.

Free consultation
Expert guidance
Tailored solutions

Related Articles

Continue exploring with these related guides