Tagged articles
14 articles
Page 1 of 1
James' Growth Diary
James' Growth Diary
Apr 29, 2026 · Information Security

Claude Code’s Five‑Layer Permission System: How It Stops Unauthorized Tool Calls

The article dissects Claude Code’s built‑in five‑layer permission architecture, explaining why a single check is insufficient, how each layer (Hooks, Deny Rules, Permission Mode, Allow Rules, canUseTool) works, the engineering trade‑offs, performance concerns, and practical recommendations for secure AI agent deployments.

Claude CodeDeny RulesFive‑Layer Defense
0 likes · 18 min read
Claude Code’s Five‑Layer Permission System: How It Stops Unauthorized Tool Calls
James' Growth Diary
James' Growth Diary
Apr 18, 2026 · Artificial Intelligence

Inside Claude Code: What 510,000 Lines of TypeScript Reveal About AI Agent Architecture

The article dissects Anthropic's open‑source Claude Code—an AI coding agent built on half a million lines of TypeScript—by walking through its agent loop, tool registry, permission system, context‑window management, hierarchical CLAUDE.md configuration, and comparing its agent‑first design to IDE‑first tools like Cursor.

AI AgentAgent LoopCLAUDE.md
0 likes · 20 min read
Inside Claude Code: What 510,000 Lines of TypeScript Reveal About AI Agent Architecture
Cognitive Technology Team
Cognitive Technology Team
Apr 15, 2026 · Artificial Intelligence

Why Claude Code’s Architecture Keeps Agents Stable: A Deep Dive into Runtime Design

This article dissects Claude Code’s multi‑layered architecture—entry routing, REPL orchestration, query loop, tool runtime, permission system, task management, and extension layers—to reveal how each layer isolates complexity, enabling robust, long‑running AI agents that scale without collapsing under real‑world workloads.

AI agent architectureClaude CodePermission System
0 likes · 42 min read
Why Claude Code’s Architecture Keeps Agents Stable: A Deep Dive into Runtime Design
Coder Trainee
Coder Trainee
Mar 5, 2026 · Backend Development

A Veteran Programmer’s Simple RBAC Permission System Design

This article walks through a straightforward back‑office permission system, defining permissions as resource collections, presenting a five‑table database schema, and explaining how classic Role‑Based Access Control (RBAC) simplifies permission management for multiple users.

BackendDatabase designPermission System
0 likes · 3 min read
A Veteran Programmer’s Simple RBAC Permission System Design
macrozheng
macrozheng
Dec 19, 2023 · Backend Development

How to Design a Scalable Permission System for SpringBoot E‑Commerce

This article walks through the complete design and implementation of a permission module for the Mall e‑commerce project, covering functional design, database schema, API specifications, and key technical choices such as Spring Security, JWT, and Redis‑based AOP optimization.

Database designJavaMicroservices
0 likes · 7 min read
How to Design a Scalable Permission System for SpringBoot E‑Commerce
Architect
Architect
Oct 30, 2023 · Information Security

How DuoLiXiong Built a Scalable Multi‑Platform RBAC Permission System

This article walks through DuoLiXiong’s three‑layer business architecture, identifies the challenges of managing permissions across dozens of platforms, explains the RBAC fundamentals and four model variants, details the concrete database schema and tree‑structured permission design, and explores row‑ and column‑level data permissions with practical examples.

BaiduData PermissionsPermission System
0 likes · 18 min read
How DuoLiXiong Built a Scalable Multi‑Platform RBAC Permission System
Architecture Digest
Architecture Digest
Apr 5, 2023 · Information Security

Design and Implementation of a Role‑Based Access Control System for the DuoliXiong Business Platform

This article introduces the DuoliXiong local‑life service platform, analyzes the challenges of permission management across its multi‑layered architecture, and details the design of a flat RBAC model—including business‑line isolation, user, role, and permission tables, tree‑structured permission mapping, and data‑level access controls—to support scalable, secure operations.

Data PermissionsMicroservicesPermission System
0 likes · 14 min read
Design and Implementation of a Role‑Based Access Control System for the DuoliXiong Business Platform
Architecture Digest
Architecture Digest
Jan 30, 2023 · Information Security

Design and Implementation of a Multi‑Platform RBAC Permission System for DuoliXiong Business

This article introduces the DuoliXiong local‑service platform, analyzes the challenges of its multi‑platform permission management, and details the design of a role‑based access control (RBAC) system—including model selection, database schema, tree‑structured permission representation, multi‑business‑line isolation, and data‑level (row/column) permissions—culminating in a scalable solution for complex B‑end and O‑end applications.

Backend ArchitectureData PermissionsMicroservices
0 likes · 14 min read
Design and Implementation of a Multi‑Platform RBAC Permission System for DuoliXiong Business
DataFunSummit
DataFunSummit
Jan 23, 2023 · Big Data

Design and Practice of the 58 Agile BI System (Starfire)

This article presents a comprehensive overview of the 58 Agile BI platform called Starfire, covering its background, technical architecture, core permission and query engine challenges, MPP cache acceleration, visualization resource library, developer services, and future development directions.

BIBig DataClickHouse
0 likes · 13 min read
Design and Practice of the 58 Agile BI System (Starfire)
Baidu Geek Talk
Baidu Geek Talk
Dec 28, 2022 · Information Security

RBAC Permission System Design and Implementation for Local Life Services Platform

This article explains Baidu's Duoli Bear permission system, detailing its business context, challenges of multi‑role and platform isolation, and the custom RBAC design that uses a tree‑structured menu, role‑based data rules, and business‑line isolation to manage access across diverse services.

Backend ArchitectureDatabase designPermission System
0 likes · 13 min read
RBAC Permission System Design and Implementation for Local Life Services Platform
NetEase Cloud Music Tech Team
NetEase Cloud Music Tech Team
Sep 24, 2020 · Information Security

Permission System Design and RBAC Implementation Practice in Backend Applications

The article explains permission system fundamentals, classifies page, function, and data permissions, compares DAC, MAC, RBAC, and ABAC models, details RBAC variants, and demonstrates a practical Egg framework plugin implementation that configures roles, resources, and data rules to achieve flexible, secure backend access control.

Backend SecurityData PermissionsEgg Framework
0 likes · 10 min read
Permission System Design and RBAC Implementation Practice in Backend Applications
Youzan Coder
Youzan Coder
Mar 16, 2018 · Information Security

Design and Implementation of the SAM Permission System for Retail Platforms

Youzan’s SAM permission system implements a scalable RBAC framework for its Retail platform—using binary‑encoded permission bits, micro‑service architecture, and unified menu/API checks—to flexibly assign and verify roles across PC, App, Pad, and future custom‑role scenarios, enhancing operational efficiency and security.

Permission SystemRBACaccess control
0 likes · 23 min read
Design and Implementation of the SAM Permission System for Retail Platforms