Alberto Leal
|
449511484d
|
fix(gateway): allow ws:// to private network addresses (#28670)
* fix(gateway): allow ws:// to RFC 1918 private network addresses
resolve ws-private-network conflicts
* gateway: keep ws security strict-by-default with private opt-in
* gateway: apply private ws opt-in in connection detail guard
* gateway: apply private ws opt-in in websocket client
* onboarding: gate private ws urls behind explicit opt-in
* gateway tests: enforce strict ws defaults with private opt-in
* onboarding tests: validate private ws opt-in behavior
* gateway client tests: cover private ws env override
* gateway call tests: cover private ws env override
* changelog: add ws strict-default security entry for pr 28670
* docs(onboard): document private ws break-glass env
* docs(gateway): add private ws env to remote guide
* docs(docker): add private ws break-glass env var
* docs(security): add private ws break-glass guidance
* docs(config): document OPENCLAW_ALLOW_PRIVATE_WS
* Update CHANGELOG.md
* gateway: normalize private-ws host classification
* test(gateway): cover non-unicast ipv6 private-ws edges
* changelog: rename insecure private ws break-glass env
* docs(onboard): rename insecure private ws env
* docs(gateway): rename insecure private ws env in config reference
* docs(gateway): rename insecure private ws env in remote guide
* docs(security): rename insecure private ws env
* docs(docker): rename insecure private ws env
* test(onboard): rename insecure private ws env
* onboard: rename insecure private ws env
* test(gateway): rename insecure private ws env in call tests
* gateway: rename insecure private ws env in call flow
* test(gateway): rename insecure private ws env in client tests
* gateway: rename insecure private ws env in client
* docker: pass insecure private ws env to services
* docker-setup: persist insecure private ws env
---------
Co-authored-by: Vincent Koc <vincentkoc@ieee.org>
|
2026-03-01 20:49:45 -08:00 |
|
Peter Steinberger
|
f8459ef46c
|
docs(security): document sessions_spawn sandbox=require hardening
|
2026-03-02 01:29:19 +00:00 |
|
Peter Steinberger
|
58659b931b
|
fix(gateway): enforce owner boundary for agent runs
|
2026-03-02 00:27:44 +00:00 |
|
Peter Steinberger
|
cc1eaf130b
|
docs(gateway): clarify remote token local fallback semantics
|
2026-02-26 15:59:44 +01:00 |
|
joshavant
|
f413e314b9
|
feat(secrets): replace migrate flow with audit/configure/apply
|
2026-02-26 14:47:22 +00:00 |
|
joshavant
|
bde9cbb058
|
docs(secrets): align provider model and add exec resolver coverage
|
2026-02-26 14:47:22 +00:00 |
|
joshavant
|
c0a3801086
|
Docs: document secrets refs runtime and migration
|
2026-02-26 14:47:22 +00:00 |
|
Gustavo Madeira Santana
|
91a3f0a3fe
|
pairing: enforce strict account-scoped state
|
2026-02-26 00:31:24 -05:00 |
|
Peter Steinberger
|
42f455739f
|
fix(security): clarify denyCommands exact-match guidance
|
2026-02-26 00:55:35 +01:00 |
|
Peter Steinberger
|
8f5f599a34
|
docs(security): note narrow filesystem roots for tool access
|
2026-02-25 05:10:10 +00:00 |
|
Peter Steinberger
|
14b6eea6e3
|
feat(sandbox): block container namespace joins by default
|
2026-02-24 23:20:34 +00:00 |
|
Peter Steinberger
|
370d115549
|
fix: enforce workspaceOnly for native prompt image autoload
|
2026-02-24 14:47:59 +00:00 |
|
Peter Steinberger
|
8cc841766c
|
docs(security): enumerate dangerous config parameters
|
2026-02-24 14:25:43 +00:00 |
|
Peter Steinberger
|
4d124e4a9b
|
feat(security): warn on likely multi-user trust-model mismatch
|
2026-02-24 14:03:19 +00:00 |
|
Peter Steinberger
|
223d7dc23d
|
feat(gateway)!: require explicit non-loopback control-ui origins
|
2026-02-24 01:57:11 +00:00 |
|
Peter Steinberger
|
5eb72ab769
|
fix(security): harden browser SSRF defaults and migrate legacy key
|
2026-02-24 01:52:01 +00:00 |
|
Peter Steinberger
|
f0f886ecc4
|
docs(security): clarify gateway-node trust boundary in docs
|
2026-02-24 01:35:44 +00:00 |
|
Peter Steinberger
|
41b0568b35
|
docs(security): clarify shared-agent trust boundaries
|
2026-02-24 01:00:05 +00:00 |
|
Peter Steinberger
|
400220275c
|
docs: clarify multi-instance recommendations for user isolation
|
2026-02-24 00:40:08 +00:00 |
|
Peter Steinberger
|
7d55277d72
|
docs: clarify operator trust boundary for shared gateways
|
2026-02-24 00:25:01 +00:00 |
|
Peter Steinberger
|
9af3ec92a5
|
fix(gateway): add HSTS header hardening and docs
|
2026-02-23 19:47:29 +00:00 |
|
Peter Steinberger
|
0d0f4c6992
|
refactor(exec): centralize safe-bin policy checks
|
2026-02-22 13:18:25 +01:00 |
|
Peter Steinberger
|
65dccbdb4b
|
fix: document onboarding dmScope default as breaking change (#23468) (thanks @bmendonca3)
|
2026-02-22 12:36:49 +01:00 |
|
Brian Mendonca
|
bc78b343ba
|
Security: expand audit checks for mDNS and real-IP fallback
|
2026-02-22 11:26:17 +01:00 |
|
Peter Steinberger
|
008a8c9dc6
|
chore(docs): normalize security finding table formatting
|
2026-02-22 08:03:29 +00:00 |
|
Peter Steinberger
|
265da4dd2a
|
fix(security): harden gateway command/audit guardrails
|
2026-02-22 08:45:48 +01:00 |
|
Peter Steinberger
|
049b8b14bc
|
fix(security): flag open-group runtime/fs exposure in audit
|
2026-02-22 08:22:51 +01:00 |
|
Peter Steinberger
|
be7f825006
|
refactor(gateway): harden proxy client ip resolution
|
2026-02-21 13:36:23 +01:00 |
|
Peter Steinberger
|
14b0d2b816
|
refactor: harden control-ui auth flow and add insecure-flag audit summary
|
2026-02-21 13:18:23 +01:00 |
|
Peter Steinberger
|
356d61aacf
|
fix(gateway): scope tailscale tokenless auth to websocket
|
2026-02-21 13:03:13 +01:00 |
|
Peter Steinberger
|
99048dbec2
|
fix(gateway): align insecure-auth toggle messaging
|
2026-02-21 12:57:22 +01:00 |
|
Peter Steinberger
|
810218756d
|
docs(security): clarify trusted-host deployment assumptions
|
2026-02-21 12:53:12 +01:00 |
|
Peter Steinberger
|
ede496fa1a
|
docs: clarify trusted-host assumption for tokenless tailscale
|
2026-02-21 12:52:49 +01:00 |
|
Peter Steinberger
|
b40821b068
|
fix: harden ACP secret handling and exec preflight boundaries
|
2026-02-19 15:34:20 +01:00 |
|
Peter Steinberger
|
a40c10d3e2
|
fix: harden agent gateway authorization scopes
|
2026-02-19 14:37:56 +01:00 |
|
Peter Steinberger
|
e3e0ffd801
|
feat(security): audit gateway HTTP no-auth exposure
|
2026-02-19 14:25:56 +01:00 |
|
Peter Steinberger
|
9c2640a810
|
docs: clarify WhatsApp group allowlist and reply mention behavior
|
2026-02-19 09:19:34 +01:00 |
|
Peter Steinberger
|
a333d92013
|
docs(security): harden gateway security guidance
|
2026-02-17 23:48:49 +01:00 |
|
Peter Steinberger
|
c6c53437f7
|
fix(security): scope session tools and webhook secret fallback
|
2026-02-16 03:47:10 +01:00 |
|
Peter Steinberger
|
ddfdd20d79
|
docs: update Slack/Discord allowFrom references
|
2026-02-15 03:49:33 +01:00 |
|
Peter Steinberger
|
4a44da7d91
|
fix(security): default apply_patch workspace containment
|
2026-02-15 03:19:27 +01:00 |
|
Peter Steinberger
|
5e7c3250cb
|
fix(security): add optional workspace-only path guards for fs tools
|
2026-02-14 23:50:24 +01:00 |
|
Peter Steinberger
|
6a386a7886
|
docs(security): clarify canvas host exposure and auth
|
2026-02-14 14:57:19 +01:00 |
|
Peter Steinberger
|
fba19fe942
|
docs: link trusted-proxy auth from gateway docs (#16172)
|
2026-02-14 12:44:25 +01:00 |
|
Peter Steinberger
|
1def8c5448
|
fix(security): extend audit hardening checks
|
2026-02-13 16:26:58 +01:00 |
|
Tulsi Prasad
|
8c920b9a18
|
fix(docs): remove hardcoded Mermaid init blocks that break dark mode (#15157)
Merged via /review-pr -> /prepare-pr -> /merge-pr.
Prepared head SHA: 3239baaf15
Co-authored-by: heytulsiprasad <52394293+heytulsiprasad@users.noreply.github.com>
Co-authored-by: sebslight <19554889+sebslight@users.noreply.github.com>
Reviewed-by: @sebslight
|
2026-02-12 22:48:26 -05:00 |
|
Peter Steinberger
|
99f28031e5
|
fix: harden OpenResponses URL input fetching
|
2026-02-13 01:38:49 +01:00 |
|
Suvin Nimnaka
|
24e9b23c4a
|
Replace text diagrams with mermaid (#7165)
* Replace text diagrams with mermaid
* Fix review comments
* Remove newlines
* docs: fix mermaid prep blockers (#7165)
---------
Co-authored-by: Sebastian <19554889+sebslight@users.noreply.github.com>
|
2026-02-09 10:27:27 -05:00 |
|
Seb Slight
|
929a3725d3
|
docs: canonicalize docs paths and align zh navigation (#11428)
* docs(navigation): canonicalize paths and align zh nav
* chore(docs): remove stray .DS_Store
* docs(scripts): add non-mint docs link audit
* docs(nav): fix zh source paths and preserve legacy redirects (#11428) (thanks @sebslight)
* chore(docs): satisfy lint for docs link audit script (#11428) (thanks @sebslight)
|
2026-02-07 15:40:35 -05:00 |
|
Val Alexander
|
3d2fe9284e
|
Fix repository links in formal-verification.md (#10200)
Updated repository links for formal verification models.
|
2026-02-06 21:47:55 -05:00 |
|