docs/enterprise-solutions/configuration/infrastructure-configuration/control-other-cline-features/yolo-mode.mdx
YOLO Mode enables Cline to operate with complete autonomy, auto-approving all actions without user confirmation. For Enterprise administrators, this page covers how to control access to YOLO Mode across your organization.
<Note> For complete details about YOLO Mode functionality, risks, and best practices, see [YOLO Mode in Features](/features/yolo-mode). </Note>When YOLO Mode is enabled, Cline automatically approves all operations including file changes, terminal commands, browser actions, and mode transitions. This provides maximum automation speed but removes all safety guardrails.
<Warning> YOLO Mode is powerful but potentially dangerous. Administrators should carefully consider which teams or users should have access to this feature. </Warning>As an Enterprise administrator, you can control whether users in your organization can enable YOLO Mode through remote configuration.
Add the following to your remote configuration JSON:
{
"yoloModeAllowed": false
}
When yoloModeAllowed is set to false:
{
"yoloModeAllowed": true
}
When yoloModeAllowed is set to true or omitted:
Most organizations should disable YOLO Mode by default for the following reasons:
<AccordionGroup> <Accordion title="Security & Compliance" icon="shield"> YOLO Mode removes all approval gates, potentially allowing: - Unreviewed code changes to critical systems - Execution of commands without oversight - Automated actions that may violate compliance policies - Risk of data exposure through unmonitored operations </Accordion> <Accordion title="Code Quality Control" icon="code"> Without approval prompts: - Changes happen too quickly to review in real-time - Mistakes can compound before detection - Quality gates are bypassed - Rollback becomes more complex </Accordion> <Accordion title="Audit Requirements" icon="clipboard-check"> Many industries require: - Documented approval trails for code changes - Clear accountability for automated actions - Traceable decision-making processes - YOLO Mode may conflict with these requirements </Accordion> </AccordionGroup>Consider enabling YOLO Mode for:
Sandbox/Development Environments
Specialized Roles
Controlled Use Cases
When YOLO Mode is enabled in your organization:
Risk Factors:
Mitigations:
When allowing YOLO Mode in your organization, implement:
Mandatory Monitoring:
Real-time Activity Tracking
Audit Trail Maintenance
Anomaly Detection
When YOLO Mode is enabled (by policy), track usage through:
Telemetry Events:
Task History:
Audit Logs:
Centralized Control through Remote Configuration:
{
"yoloModeAllowed": false,
// Other policies...
}
This setting:
The enforcement mechanism:
For organizations in regulated industries:
SOC 2 Compliance:
GDPR/Data Protection:
Industry-Specific:
For help configuring YOLO Mode policies: