Execution Tiers
Understand the different permission levels for agents.
Execution Tiers
Fleet uses a layered permission system. The execution tier is the base layer that determines what tools and commands agents can use by default.
Available Tiers
Restricted
The most conservative tier. Agents can only use safe, read-only operations.
Allowed:
- Safe bash commands (ls, pwd, cat, etc.)
- Read files
- List directories
- Take screenshots
- Browser view-only (no clicking or typing)
Requires approval: Most other operations
Use for: Agents you don't fully trust, or when you want maximum control
Read-Only
Expanded read access for inspection and research tasks.
Allowed:
- All Restricted tier operations
- Search operations (grep, find)
- Web fetch (retrieve web pages)
- Web search
- Full browser navigation (view only)
Use for: Research agents, code reviewers, documentation tasks
Read/Write
Standard development tier. Agents can create, modify, and delete files.
Allowed:
- All Read-Only tier operations
- Write, edit, and delete files
- Create sub-agents
- Workspace operations
- Vault access (read secrets)
- Schedule tasks
- Agent management
- Trigger management
Use for: Building, coding, content creation
Setting Your Default Tier
- Open Settings (Cmd+,)
- Go to Security
- Choose a default execution tier
- All new agents will use this tier
Per-Agent Override
Each agent can have its own execution tier that overrides the global default.
Via UI
- Open agent → Settings (gear icon)
- Go to Permissions
- Override execution tier
- Save
Via AGENT.md
permissions:
execution_tier: read_only
Combining with Permission Rules
Execution tiers provide the base permissions. Permission Rules let you fine-tune by adding or removing specific tool access.
Example: Allow npm commands in Restricted tier:
permissions:
execution_tier: restricted
rules:
- "Bash(npm install)"
- "Bash(npm test)"
Tier Inheritance
When an agent spawns sub-agents:
- Sub-agents inherit parent's execution tier by default
- Sub-agents can be more restrictive but not less
- Use
allowed_subagentsto control which agents can be spawned
Non-Interactive Triggers
For triggers that run without user interaction (schedules, file watchers, daemons):
- Agent must have appropriate execution tier pre-configured
- No approval prompts are possible
- Use
rulesto pre-approve specific tool patterns
permissions:
execution_tier: read_write
rules:
- "Bash(npm run build)"
- "Bash(git commit*)"