Peter Steinberger
|
daaf211e20
|
fix(node-host): fail closed on unbound interpreter approvals
|
2026-03-11 02:36:38 +00:00 |
|
Peter Steinberger
|
201420a7ee
|
fix: harden secret-file readers
|
2026-03-10 23:40:10 +00:00 |
|
Josh Avant
|
a76e810193
|
fix(gateway): harden token fallback/reconnect behavior and docs (#42507)
* fix(gateway): harden token fallback and auth reconnect handling
* docs(gateway): clarify auth retry and token-drift recovery
* fix(gateway): tighten auth reconnect gating across clients
* fix: harden gateway token retry (#42507) (thanks @joshavant)
|
2026-03-10 17:05:57 -05:00 |
|
Vincent Koc
|
042b2c867d
|
Docs: clarify main secret scan behavior
|
2026-03-06 14:41:23 -05:00 |
|
Vincent Koc
|
b529b7c6b7
|
Docs: update secret scan reproduction steps
|
2026-03-06 14:34:46 -05:00 |
|
scoootscooob
|
ff96e41c38
|
fix(discord): align DiscordAccountConfig.token type with SecretInput (#32490)
Merged via squash.
Prepared head SHA: 233aa032f1
Co-authored-by: scoootscooob <167050519+scoootscooob@users.noreply.github.com>
Co-authored-by: joshavant <830519+joshavant@users.noreply.github.com>
Reviewed-by: @joshavant
|
2026-03-03 14:59:57 -06:00 |
|
dorukardahan
|
2cd3be896d
|
docs(security): document Docker UFW hardening via DOCKER-USER (#27613)
Merged via squash.
Prepared head SHA: 31ddd43326
Co-authored-by: dorukardahan <35905596+dorukardahan@users.noreply.github.com>
Co-authored-by: grp06 <1573959+grp06@users.noreply.github.com>
Reviewed-by: @grp06
|
2026-03-03 12:28:35 -08:00 |
|
Peter Steinberger
|
11c397ef46
|
docs: strengthen prompt injection warning for weaker models
|
2026-03-03 00:06:39 +00:00 |
|
Peter Steinberger
|
6b85ec3022
|
docs: tighten subscription guidance and update MiniMax M2.5 refs
|
2026-03-03 00:02:37 +00:00 |
|
Peter Steinberger
|
132794fe74
|
feat(security): audit workspace skill symlink escapes
|
2026-03-02 23:28:54 +00:00 |
|
Peter Steinberger
|
cf5702233c
|
docs(security)!: document messaging-only onboarding default and hook/model risk
|
2026-03-02 18:15:49 +00:00 |
|
Alberto Leal
|
449511484d
|
fix(gateway): allow ws:// to private network addresses (#28670)
* fix(gateway): allow ws:// to RFC 1918 private network addresses
resolve ws-private-network conflicts
* gateway: keep ws security strict-by-default with private opt-in
* gateway: apply private ws opt-in in connection detail guard
* gateway: apply private ws opt-in in websocket client
* onboarding: gate private ws urls behind explicit opt-in
* gateway tests: enforce strict ws defaults with private opt-in
* onboarding tests: validate private ws opt-in behavior
* gateway client tests: cover private ws env override
* gateway call tests: cover private ws env override
* changelog: add ws strict-default security entry for pr 28670
* docs(onboard): document private ws break-glass env
* docs(gateway): add private ws env to remote guide
* docs(docker): add private ws break-glass env var
* docs(security): add private ws break-glass guidance
* docs(config): document OPENCLAW_ALLOW_PRIVATE_WS
* Update CHANGELOG.md
* gateway: normalize private-ws host classification
* test(gateway): cover non-unicast ipv6 private-ws edges
* changelog: rename insecure private ws break-glass env
* docs(onboard): rename insecure private ws env
* docs(gateway): rename insecure private ws env in config reference
* docs(gateway): rename insecure private ws env in remote guide
* docs(security): rename insecure private ws env
* docs(docker): rename insecure private ws env
* test(onboard): rename insecure private ws env
* onboard: rename insecure private ws env
* test(gateway): rename insecure private ws env in call tests
* gateway: rename insecure private ws env in call flow
* test(gateway): rename insecure private ws env in client tests
* gateway: rename insecure private ws env in client
* docker: pass insecure private ws env to services
* docker-setup: persist insecure private ws env
---------
Co-authored-by: Vincent Koc <vincentkoc@ieee.org>
|
2026-03-01 20:49:45 -08:00 |
|
Peter Steinberger
|
f8459ef46c
|
docs(security): document sessions_spawn sandbox=require hardening
|
2026-03-02 01:29:19 +00:00 |
|
Peter Steinberger
|
58659b931b
|
fix(gateway): enforce owner boundary for agent runs
|
2026-03-02 00:27:44 +00:00 |
|
Peter Steinberger
|
cc1eaf130b
|
docs(gateway): clarify remote token local fallback semantics
|
2026-02-26 15:59:44 +01:00 |
|
joshavant
|
f413e314b9
|
feat(secrets): replace migrate flow with audit/configure/apply
|
2026-02-26 14:47:22 +00:00 |
|
joshavant
|
bde9cbb058
|
docs(secrets): align provider model and add exec resolver coverage
|
2026-02-26 14:47:22 +00:00 |
|
joshavant
|
c0a3801086
|
Docs: document secrets refs runtime and migration
|
2026-02-26 14:47:22 +00:00 |
|
Gustavo Madeira Santana
|
91a3f0a3fe
|
pairing: enforce strict account-scoped state
|
2026-02-26 00:31:24 -05:00 |
|
Peter Steinberger
|
42f455739f
|
fix(security): clarify denyCommands exact-match guidance
|
2026-02-26 00:55:35 +01:00 |
|
Peter Steinberger
|
8f5f599a34
|
docs(security): note narrow filesystem roots for tool access
|
2026-02-25 05:10:10 +00:00 |
|
Peter Steinberger
|
14b6eea6e3
|
feat(sandbox): block container namespace joins by default
|
2026-02-24 23:20:34 +00:00 |
|
Peter Steinberger
|
370d115549
|
fix: enforce workspaceOnly for native prompt image autoload
|
2026-02-24 14:47:59 +00:00 |
|
Peter Steinberger
|
8cc841766c
|
docs(security): enumerate dangerous config parameters
|
2026-02-24 14:25:43 +00:00 |
|
Peter Steinberger
|
4d124e4a9b
|
feat(security): warn on likely multi-user trust-model mismatch
|
2026-02-24 14:03:19 +00:00 |
|
Peter Steinberger
|
223d7dc23d
|
feat(gateway)!: require explicit non-loopback control-ui origins
|
2026-02-24 01:57:11 +00:00 |
|
Peter Steinberger
|
5eb72ab769
|
fix(security): harden browser SSRF defaults and migrate legacy key
|
2026-02-24 01:52:01 +00:00 |
|
Peter Steinberger
|
f0f886ecc4
|
docs(security): clarify gateway-node trust boundary in docs
|
2026-02-24 01:35:44 +00:00 |
|
Peter Steinberger
|
41b0568b35
|
docs(security): clarify shared-agent trust boundaries
|
2026-02-24 01:00:05 +00:00 |
|
Peter Steinberger
|
400220275c
|
docs: clarify multi-instance recommendations for user isolation
|
2026-02-24 00:40:08 +00:00 |
|
Peter Steinberger
|
7d55277d72
|
docs: clarify operator trust boundary for shared gateways
|
2026-02-24 00:25:01 +00:00 |
|
Peter Steinberger
|
9af3ec92a5
|
fix(gateway): add HSTS header hardening and docs
|
2026-02-23 19:47:29 +00:00 |
|
Peter Steinberger
|
0d0f4c6992
|
refactor(exec): centralize safe-bin policy checks
|
2026-02-22 13:18:25 +01:00 |
|
Peter Steinberger
|
65dccbdb4b
|
fix: document onboarding dmScope default as breaking change (#23468) (thanks @bmendonca3)
|
2026-02-22 12:36:49 +01:00 |
|
Brian Mendonca
|
bc78b343ba
|
Security: expand audit checks for mDNS and real-IP fallback
|
2026-02-22 11:26:17 +01:00 |
|
Peter Steinberger
|
008a8c9dc6
|
chore(docs): normalize security finding table formatting
|
2026-02-22 08:03:29 +00:00 |
|
Peter Steinberger
|
265da4dd2a
|
fix(security): harden gateway command/audit guardrails
|
2026-02-22 08:45:48 +01:00 |
|
Peter Steinberger
|
049b8b14bc
|
fix(security): flag open-group runtime/fs exposure in audit
|
2026-02-22 08:22:51 +01:00 |
|
Peter Steinberger
|
be7f825006
|
refactor(gateway): harden proxy client ip resolution
|
2026-02-21 13:36:23 +01:00 |
|
Peter Steinberger
|
14b0d2b816
|
refactor: harden control-ui auth flow and add insecure-flag audit summary
|
2026-02-21 13:18:23 +01:00 |
|
Peter Steinberger
|
356d61aacf
|
fix(gateway): scope tailscale tokenless auth to websocket
|
2026-02-21 13:03:13 +01:00 |
|
Peter Steinberger
|
99048dbec2
|
fix(gateway): align insecure-auth toggle messaging
|
2026-02-21 12:57:22 +01:00 |
|
Peter Steinberger
|
810218756d
|
docs(security): clarify trusted-host deployment assumptions
|
2026-02-21 12:53:12 +01:00 |
|
Peter Steinberger
|
ede496fa1a
|
docs: clarify trusted-host assumption for tokenless tailscale
|
2026-02-21 12:52:49 +01:00 |
|
Peter Steinberger
|
b40821b068
|
fix: harden ACP secret handling and exec preflight boundaries
|
2026-02-19 15:34:20 +01:00 |
|
Peter Steinberger
|
a40c10d3e2
|
fix: harden agent gateway authorization scopes
|
2026-02-19 14:37:56 +01:00 |
|
Peter Steinberger
|
e3e0ffd801
|
feat(security): audit gateway HTTP no-auth exposure
|
2026-02-19 14:25:56 +01:00 |
|
Peter Steinberger
|
9c2640a810
|
docs: clarify WhatsApp group allowlist and reply mention behavior
|
2026-02-19 09:19:34 +01:00 |
|
Peter Steinberger
|
a333d92013
|
docs(security): harden gateway security guidance
|
2026-02-17 23:48:49 +01:00 |
|
Peter Steinberger
|
c6c53437f7
|
fix(security): scope session tools and webhook secret fallback
|
2026-02-16 03:47:10 +01:00 |
|