The main problem I can think of is that that command will set the execute bit on all files, even those that aren’t executable. So, if you have a file called foo
, and someday you want to do cat foo
or print foo
and you accidentally type just foo
, the shell will try to execute foo
; i.e., interpret it as a shell script. This will probably just explode in your face harmlessly, but if foo
contains anything that looks like a shell command, you could get harmful results.
A lesser issue is that if you have a file that you want to preserve, and last year you did a chmod 444
to protect it from yourself, the chmod 700
will restore your write bit, and make it easier for you to clobber the file accidentally.
The solution to both issues is to do chmod go= -R ~
or chmod go-rwx -R ~
, which will turn off all bits for group and others, but leave your access alone.