Skip to content

Tools, integrations, and security

This chapter combines three concerns that are inseparable in Claude Code:

  1. Which capabilities become model-visible tools?
  2. Which external systems contribute tools, prompts, hooks, plugins, or agents?
  3. Which trust boundaries approve, deny, redact, or persist policy?

Read this chapter when the question is: why could the model do that, and what guarded the action?

Source-anchor policy

This page is a chapter guide. Linked implementation pages carry concrete cli.js anchors.

Semantic aliasMinified anchorScope
Tools/integrations/security chapterN/A — navigation pageGroups built-in tools, permissions, MCP/plugins/hooks, settings, and integration policy.
Tool/security implementation pagesSee linked source-anchor tablesConcrete bundle anchors live in destination pages.

Trust-boundary map

flowchart TD
Builtins[Built-in tools] --> Assembly[Runtime tool set]
MCP[MCP servers] --> Assembly
Plugins[Plugins / skills / agents / hooks] --> Assembly
IDE[IDE / Chrome / file resources] --> Assembly
Assembly --> Model[Model-visible capabilities]
Model --> ToolCall[Tool call]
ToolCall --> Permissions[Permission mode and allow/deny rules]
Permissions --> Hooks[Hook events]
Hooks --> Execute[Execute or deny]
Execute --> Events[Session events / telemetry]

Primary reading order

OrderPageTool/security question answered
1Tool runtime, events, and integration flowsWhich tools exist, how do events/communication/shell/SDK/LSP/Web/context exclusion/settings/persistence fit together, and where are the main cli.js anchors?
2Tool inventory and schemasWhich built-in, MCP, plugin, skill, and agent/task tool surfaces exist, who owns their schemas, and which permission boundary applies?
3Built-in tools and permissionsWhich built-in tool names exist, how do flags filter or permission them, and how does ToolExecutionBoundary mediate PreToolUse, can_use_tool, PermissionDenied, and edit/web guards?
4Sandbox and isolationHow does command sandboxing work, which Linux/macOS mechanisms are used, and how do strict/fallback modes, filesystem policy, and network filtering compose with tool permissions?
5MCP, plugins, and hooksHow are MCP servers, plugins, marketplaces, and lifecycle hooks wired into the runtime, and how does McpRuntimeCoordinator connect always-load configs, regular configs, and claude.ai connectors?
6Hooks and events referenceWhich hook names, lifecycle events, stream frames, control frames, and MCP protocol methods are visible?
7Settings, policy, and integrationsWhich settings files, managed policy knobs, IDE/Chrome/file integrations, and helper scripts shape runtime behavior?
8Settings schema referenceWhich known settings roots, keys, policy groups, and setting-vs-flag-vs-env boundaries should readers use as canonical references?
9Tool runtime and security architectureHow is the capability registry + single execution boundary structured, and how do MCP/plugins/hooks/integrations compose without bypassing trust?

Handoffs

Created and maintained by Yingting Huang.