mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-06 14:20:44 +00:00
docs(plugins): trim skill-workshop headings and collapse example variants; tighten codex-harness guardian explainer
This commit is contained in:
@@ -304,44 +304,9 @@ To opt in to Codex guardian-reviewed approvals, set `appServer.mode:
|
||||
}
|
||||
```
|
||||
|
||||
Guardian mode expands to:
|
||||
Guardian is a native Codex approval reviewer. When Codex asks to leave the sandbox, write outside the workspace, or add permissions like network access, Codex routes that approval request to a reviewer subagent instead of a human prompt. The reviewer applies Codex's risk framework and approves or denies the specific request. Use Guardian when you want more guardrails than YOLO mode but still need unattended agents to make progress.
|
||||
|
||||
```json5
|
||||
{
|
||||
plugins: {
|
||||
entries: {
|
||||
codex: {
|
||||
enabled: true,
|
||||
config: {
|
||||
appServer: {
|
||||
mode: "guardian",
|
||||
approvalPolicy: "on-request",
|
||||
approvalsReviewer: "guardian_subagent",
|
||||
sandbox: "workspace-write",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
```
|
||||
|
||||
Guardian is a native Codex approval reviewer. When Codex asks to leave the
|
||||
sandbox, write outside the workspace, or add permissions such as network access,
|
||||
Codex routes that approval request to a reviewer subagent instead of a human
|
||||
prompt. The reviewer gathers context and applies Codex's risk framework, then
|
||||
approves or denies the specific request. Guardian is useful when you want more
|
||||
guardrails than YOLO mode but still need unattended agents and heartbeats to
|
||||
make progress.
|
||||
|
||||
The Docker live harness includes a Guardian probe when
|
||||
`OPENCLAW_LIVE_CODEX_HARNESS_GUARDIAN_PROBE=1`. It starts the Codex harness in
|
||||
Guardian mode, verifies that a benign escalated shell command is approved, and
|
||||
verifies that a fake-secret upload to an untrusted external destination is
|
||||
denied so the agent asks back for explicit approval.
|
||||
|
||||
The individual policy fields still win over `mode`, so advanced deployments can
|
||||
mix the preset with explicit choices.
|
||||
The `guardian` preset expands to `approvalPolicy: "on-request"`, `approvalsReviewer: "guardian_subagent"`, and `sandbox: "workspace-write"`. Individual policy fields still override `mode`, so advanced deployments can mix the preset with explicit choices.
|
||||
|
||||
For an already-running app-server, use WebSocket transport:
|
||||
|
||||
|
||||
Reference in New Issue
Block a user