Files
claw3d/SECURITY.md
T
2026-03-17 23:36:50 -05:00

39 lines
1.5 KiB
Markdown

# Security Policy
## Reporting A Vulnerability
Please do not open public GitHub issues for security vulnerabilities.
Preferred path:
- If the repository host exposes private vulnerability reporting or GitHub Security Advisories for this repo, use that path first.
Fallback path:
- If no private reporting channel is available, open a minimal public issue requesting a private contact channel and do not include exploit details, tokens, or proof-of-concept payloads in that issue.
When reporting a vulnerability, include:
- A clear description of the issue.
- Impact and affected areas.
- Reproduction steps or a proof of concept.
- Any suggested mitigation if you have one.
We aim to acknowledge reports promptly, investigate them, and coordinate a fix and disclosure timeline with the reporter.
## Current Security Limitations
- Studio gateway settings are stored on disk in plaintext under the local OpenClaw state directory.
- The current UI loads the configured upstream gateway URL/token into browser memory at runtime, even though those values are not stored in browser persistent storage.
- The Studio access gate still supports a legacy query-parameter bootstrap flow for setting its access cookie when `STUDIO_ACCESS_TOKEN` is enabled.
## Scope
Please report issues related to:
- Authentication or access-control bypasses.
- Secret handling or token exposure.
- Remote code execution or privilege escalation paths.
- Unsafe filesystem, proxy, or network behavior.
- Dependency vulnerabilities that materially affect this project.