Give AI coding agents case-by-case sudo access via GUI approval, with SSH-key-encrypted password storage
Project description
sudoplz
Give Claude Code, Cursor, and other AI coding agents the ability to run sudo — with case-by-case GUI approval, no passwordless sudo, no /etc/sudoers allowlists.
Your sudo password is encrypted with your SSH private key and only decrypted after you approve a dialog showing the exact command about to run. Deny the dialog and nothing happens.
Why
Coding agents can't handle interactive terminal prompts. Ask Claude Code to run sudo apt install foo and you get sudo: Authentication failed. The common workarounds all have problems:
- Passwordless sudo gives the agent — and anything else running as your user — unrestricted root.
/etc/sudoersallowlists require predicting every command the agent will ever need. No case-by-case review.- Manual copy-paste is tedious and breaks the agent's flow.
sudoplz plugs into sudo -A, so the agent runs sudo -A <command>, you see a dialog with the exact command, and you click Allow or Deny. Works for any command without pre-declaring what's permitted.
This threat model assumes a personal workstation with an encrypted disk and a passphrase-protected SSH key. Not appropriate for shared or production systems.
Installation
- Use traditional
sudo, notsudo-rs.sudo-rsdoesn't support askpass. Check withsudo --version— it should say "Sudo version 1.x.x". If you're onsudo-rs, switch:sudo update-alternatives --install /usr/bin/sudo sudo /usr/bin/sudo.ws 100 sudo update-alternatives --config sudo # pick sudo.ws
- Make sure you have an SSH key (ed25519, ecdsa, rsa, or dsa).
- Install system dependencies:
age— required if your SSH key is Ed25519 (the most common case today).sudo pacman -S age/sudo apt install age/brew install age.zenityon Linux — provides the GUI approval dialog. Pre-installed on most GNOME-based distros;sudo apt install zenityif missing. Not needed on macOS (uses AppleScript).
- Install the tools with
uv:uv tool install .
This putsaskpassandsudoplzon your PATH. - Point
SUDO_ASKPASSat the installed binary (add to~/.bashrc,~/.zshrc, etc.):export SUDO_ASKPASS="$(which askpass)"
- Store your sudo password:
sudoplz set
Usage
Your agent (or you) runs sudo -A <command>. A dialog pops up showing the command. You approve or deny.
sudo -A apt install foo
Gotcha: sudo -n explicitly disallows prompting and will never trigger askpass. Always use -A.
Test the integration with:
sudoplz test
Security
Encryption at rest
Passwords are encrypted with your SSH key:
- Ed25519:
ageencryption, stored at~/.sudo_askpass.age - RSA/ECDSA/DSA: OpenSSL asymmetric encryption, stored at
~/.sudo_askpass.ssh
Encrypted files have 600 permissions. Key preference: ed25519 > ecdsa > rsa > dsa. Falls back to the system keyring if available. Refuses plain text storage.
Defense in depth
Encryption alone doesn't cover every abuse path — anything running as your user can in principle request decryption. The askpass script runs these checks on every invocation; any failure means no decryption:
- Caller path whitelist. Only decrypts when the caller's working directory is on an allowlist (home,
/tmp, etc.). Blocks invocations from unexpected locations like/var/tmp/malicious. - Caller process whitelist. Parent process must be on an allowlist (sudo, your shell, your IDE, your deploy tool). Keeps arbitrary binaries from invoking askpass directly.
- User confirmation. A GUI dialog asks for approval on each decryption, so any sudo elevation you didn't initiate is visible and can be denied.
- Rate limiting. Configurable max-attempts-per-hour and lockout window. Contains runaway scripts and brute-force attempts.
- Password expiration. Stored passwords age out automatically (default: 1 week). A stolen blob becomes useless once it expires, even with your SSH key.
Configure these in ~/.config/sudoplz/config.json — an example is shipped as askpass-config.json in the repo; copy it and edit.
Why age for Ed25519?
Ed25519 is a signing algorithm (EdDSA), not encryption. OpenSSL handles RSA encryption directly, but Ed25519 keys can't do asymmetric encryption at all. age was designed to work with SSH keys including Ed25519.
SSH key unlocking
If your SSH key has a passphrase (recommended), the askpass tool will:
- Check whether the key is loaded in ssh-agent
- Prompt for the passphrase via GUI if it isn't
- Load the key into ssh-agent for the session
You enter the passphrase once per session. After that, sudo commands only need the confirmation dialog. You need a running ssh-agent — most desktop environments start one on login; if not, eval "$(ssh-agent -s)" in your shell startup.
This works under sudo -A even though sudo strips SSH_AUTH_SOCK: the script reconnects to your running ssh-agent.
Commands
sudoplz set # Store password (terminal prompt; expires per config, 1 week default)
sudoplz set-totp # Store password with TOTP verification (headless)
sudoplz totp-setup # Set up TOTP for headless sessions
sudoplz get # Check if password exists
sudoplz clear # Remove password
sudoplz test # Test sudo integration
sudoplz audit # Show recent askpass usage
Headless/SSH usage with TOTP
For servers or SSH sessions without a display, authenticate with TOTP.
Initial setup (run once from a GUI session)
sudoplz totp-setup
Prints a TOTP secret and an otpauth:// URL to add to your authenticator app.
Setting a password from a headless session
sudoplz set-totp
Enter your 6-digit TOTP code, then your password.
Using sudo with TOTP
When DISPLAY isn't set, askpass prompts for a TOTP code:
# Interactive — prompts for TOTP code
sudo -A command
# Non-interactive — pass TOTP via environment
TOTP="123456" sudo -A command
Credits
The idea — an SSH-key-encrypted sudo password served via SUDO_ASKPASS, gated by a confirmation dialog — is from GlassOnTin/secure-askpass. That project is dormant; sudoplz is a substantially rewritten and cleaned up fork. Thanks to @GlassOnTin for the original idea.
License
MIT — see LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file sudoplz-0.2.0.tar.gz.
File metadata
- Download URL: sudoplz-0.2.0.tar.gz
- Upload date:
- Size: 46.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.9.24 {"installer":{"name":"uv","version":"0.9.24","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"25.10","id":"questing","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
30d4c78b059fa44cebb4ae6d43bf066d07855e2141a88cdb0fd3702438cde73c
|
|
| MD5 |
27620b800175647cdc80de5d5116dbc8
|
|
| BLAKE2b-256 |
607f66d68bdedd136612f729ddfd1a2a38b3bd0fcd9c0a5235ac58b6cb67cc15
|
File details
Details for the file sudoplz-0.2.0-py3-none-any.whl.
File metadata
- Download URL: sudoplz-0.2.0-py3-none-any.whl
- Upload date:
- Size: 15.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.9.24 {"installer":{"name":"uv","version":"0.9.24","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"25.10","id":"questing","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
b6e25fe3b10ea06a25051cb575a6ce2570e2e4f6e9755ea8e271a9fb5d2ea572
|
|
| MD5 |
842bb01957cf836c3b8c822d3ac14ef3
|
|
| BLAKE2b-256 |
153a711e38e2aeba0b5cadc0dce886412ad08f6851f3e23d6649505e30027356
|