docs: normalize mintlify component closings

This commit is contained in:
Peter Steinberger
2026-04-28 07:53:31 +01:00
parent 8831d2cf0a
commit 424560c6c2
12 changed files with 16 additions and 16 deletions

View File

@@ -323,7 +323,7 @@ top-level `bindings[]` entries.
- **Telegram forum topic:** `match.channel="telegram"` + `match.peer.id="<chatId>:topic:<topicId>"`
- **BlueBubbles DM/group:** `match.channel="bluebubbles"` + `match.peer.id="<handle|chat_id:*|chat_guid:*|chat_identifier:*>"`. Prefer `chat_id:*` or `chat_identifier:*` for stable group bindings.
- **iMessage DM/group:** `match.channel="imessage"` + `match.peer.id="<handle|chat_id:*|chat_guid:*|chat_identifier:*>"`. Prefer `chat_id:*` for stable group bindings.
</ParamField>
</ParamField>
<ParamField path="bindings[].agentId" type="string">
The owning OpenClaw agent id.
</ParamField>
@@ -714,7 +714,7 @@ OpenClaw sandbox.
- OpenClaw's sandbox policy does **not** wrap ACP harness execution.
- OpenClaw still enforces ACP feature gates, allowed agents, session ownership, channel bindings, and Gateway delivery policy.
- Use `runtime: "subagent"` for sandbox-enforced OpenClaw-native work.
</Warning>
</Warning>
Current limitations:

View File

@@ -137,7 +137,7 @@ Example schema:
- `deny` — block.
- `allowlist` — allow only if allowlist matches.
- `full` — allow.
</ParamField>
</ParamField>
### `tools.exec.strictInlineEval`
@@ -184,7 +184,7 @@ YOLO is the default host behavior unless you tighten it explicitly:
- YOLO chooses **how** host exec is approved: `security=full` plus `ask=off`.
- In YOLO mode, OpenClaw does **not** add a separate heuristic command-obfuscation approval gate or script-preflight rejection layer on top of the configured host exec policy.
- `auto` does not make gateway routing a free override from a sandboxed session. A per-call `host=node` request is allowed from `auto`; `host=gateway` is only allowed from `auto` when no sandbox runtime is active. For a stable non-auto default, set `tools.exec.host` or use `/exec host=...` explicitly.
</Warning>
</Warning>
CLI-backed providers that expose their own noninteractive permission mode
can follow this policy. Claude CLI adds
@@ -262,7 +262,7 @@ EOF
- `openclaw exec-policy` does not synchronize node approvals.
- `openclaw exec-policy set --host node` is rejected.
- Node exec approvals are fetched from the node at runtime, so node-targeted updates must use `openclaw approvals --node ...`.
</Note>
</Note>
### Session-only shortcut