mirror of
https://github.com/openclaw/openclaw.git
synced 2026-03-12 07:20:45 +00:00
fix(gateway): enforce owner boundary for agent runs
This commit is contained in:
@@ -724,6 +724,12 @@ injected by Tailscale.
|
||||
HTTP API endpoints (for example `/v1/*`, `/tools/invoke`, and `/api/channels/*`)
|
||||
still require token/password auth.
|
||||
|
||||
Important boundary note:
|
||||
|
||||
- Gateway HTTP bearer auth is effectively all-or-nothing operator access.
|
||||
- Treat credentials that can call `/v1/chat/completions`, `/v1/responses`, `/tools/invoke`, or `/api/channels/*` as full-access operator secrets for that gateway.
|
||||
- Do not share these credentials with untrusted callers; prefer separate gateways per trust boundary.
|
||||
|
||||
**Trust assumption:** tokenless Serve auth assumes the gateway host is trusted.
|
||||
Do not treat this as protection against hostile same-host processes. If untrusted
|
||||
local code may run on the gateway host, disable `gateway.auth.allowTailscale`
|
||||
|
||||
Reference in New Issue
Block a user