Feature Request
Currently, max_actions_per_hour, max_cost_per_day_cents, and max_tool_iterations in config.toml are u32 values with no documented way to disable them.
Setting them to 0 effectively means "zero allowed" (since the check in security/policy.rs is count <= max_actions_per_hour), which is counterintuitive — users expect 0 to mean unlimited.
Proposal
Support a sentinel value like -1 or a boolean flag like rate_limit_enabled = false to explicitly disable rate limiting for self-hosted deployments where users want full autonomy.
Current workaround
Setting values very high (e.g. 10000) works but feels like a hack.
Context
Running a self-hosted ZeroClaw instance on a GCE VM for internal team use. Hit the default 20 actions/hour limit quickly during normal operation. Would love an official way to opt out.
Feature Request
Currently,
max_actions_per_hour,max_cost_per_day_cents, andmax_tool_iterationsinconfig.tomlareu32values with no documented way to disable them.Setting them to
0effectively means "zero allowed" (since the check insecurity/policy.rsiscount <= max_actions_per_hour), which is counterintuitive — users expect0to mean unlimited.Proposal
Support a sentinel value like
-1or a boolean flag likerate_limit_enabled = falseto explicitly disable rate limiting for self-hosted deployments where users want full autonomy.Current workaround
Setting values very high (e.g.
10000) works but feels like a hack.Context
Running a self-hosted ZeroClaw instance on a GCE VM for internal team use. Hit the default 20 actions/hour limit quickly during normal operation. Would love an official way to opt out.