Files
claw3d/SECURITY.md
T
gsknnft 051d0ce469 security: harden gateway proxy, custom runtime proxy, and media routes (#95)
* security hardening pass 1 - otel removed

* hardening pass #2

* feat security hardening pass

* chore: trim unrelated docs from security hardening pr

* fix: address security hardening review findings

* address findings
2026-04-03 17:02:06 -05:00

2.0 KiB

Security Policy

Reporting A Vulnerability

Please do not open public GitHub issues for security vulnerabilities.

Preferred path:

  • If the repository host exposes private vulnerability reporting or GitHub Security Advisories for this repo, use that path first.

Fallback path:

  • If no private reporting channel is available, open a minimal public issue requesting a private contact channel and do not include exploit details, tokens, or proof-of-concept payloads in that issue.

When reporting a vulnerability, include:

  • A clear description of the issue.
  • Impact and affected areas.
  • Reproduction steps or a proof of concept.
  • Any suggested mitigation if you have one.

We aim to acknowledge reports promptly, investigate them, and coordinate a fix and disclosure timeline with the reporter.

Current Security Limitations

  • Studio gateway settings are stored on disk in plaintext under the local OpenClaw state directory.
  • The current UI loads the configured upstream gateway URL/token into browser memory at runtime, even though those values are not stored in browser persistent storage.
  • There is currently no built-in cookie issuance/login flow for STUDIO_ACCESS_TOKEN; deployments that enable the access gate must provision the studio_access cookie outside the app.

Scope

Please report issues related to:

  • Authentication or access-control bypasses.
  • Secret handling or token exposure.
  • Remote code execution or privilege escalation paths.
  • Unsafe filesystem, proxy, or network behavior.
  • Dependency vulnerabilities that materially affect this project.

Deployment Notes

  • In production, set UPSTREAM_ALLOWLIST for the Studio gateway proxy.
  • In production, set CUSTOM_RUNTIME_ALLOWLIST if you use /api/runtime/custom. If unset, it falls back to UPSTREAM_ALLOWLIST.
  • Empty allowlists are intended for local development only.
  • If you enable STUDIO_ACCESS_TOKEN, you must also provision the studio_access cookie through your deployment/auth layer.