CLI commands
callers
List and inspect AI tool caller profiles.
Security Layer auto-detects which AI tool triggered a command and applies the appropriate capability profile. The callers command lets you view these profiles.
Usage
sl callers list
sl callers profile <name>Subcommands
callers list
Shows all configured AI tool callers with their detection rules and capabilities.
$ sl callers list
claude-code (Claude Code)
taint: OWNER
capabilities: exec, file.read, file.write, web_fetch
detect env: CLAUDE_CODE
detect process: claude
cursor (Cursor)
taint: TRUSTED_CONTACT
capabilities: exec, file.read, file.write
detect env: CURSOR_SESSION
detect process: cursorcallers profile <name>
Shows detailed information for a specific caller.
$ sl callers profile claude-code
ID: claude-code
Display name: Claude Code
Default taint: OWNER
Capabilities:
exec, file.read, file.write, web_fetch
Detection:
Environment: CLAUDE_CODE
Process: claudeExit codes: 0 on success, 1 if the caller is unknown or the name argument is missing.
How detection works
When a command is intercepted (via shell shim or hook), Security Layer checks:
- Environment variables — Does the calling process have specific env vars set?
- Process name — Does the parent process match a known AI tool?
The detected caller determines which capability profile is applied.
See also
- Shell shim — How shims detect callers
- Configuration — Editing caller profiles