Shakker
|
2e520d112d
|
refactor: split browser sdk imports for sandbox and audit
|
2026-04-03 16:39:47 +01:00 |
|
Vincent Koc
|
08962b6812
|
fix(browser): keep static helper seams cold (#59471)
* fix(browser): keep static helper seams cold
* fix(browser): narrow sandbox helper facade imports
* fix(browser): harden host inspection helpers
|
2026-04-02 17:12:32 +09:00 |
|
Peter Steinberger
|
276ccd2583
|
fix(exec): default implicit target to auto
|
2026-03-30 06:03:08 +09:00 |
|
scoootscooob
|
5d81b64343
|
fix(exec): fail closed when sandbox is unavailable and harden deny followups (#56800)
* fix(exec): fail closed when sandbox is unavailable and harden deny followups
* docs(changelog): note exec fail-closed fix
|
2026-03-28 22:20:49 -07:00 |
|
Peter Steinberger
|
83ca6fbfc6
|
refactor: finish browser compat untangle
|
2026-03-26 22:42:41 +00:00 |
|
Peter Steinberger
|
6b9915a106
|
refactor!: drop legacy CLAWDBOT env compatibility
|
2026-03-22 22:13:39 -07:00 |
|
Peter Steinberger
|
0ac939059e
|
refactor(exec): split safe-bin semantics
|
2026-03-22 10:14:46 -07:00 |
|
Peter Steinberger
|
a94ec3b79b
|
fix(security): harden exec approval boundaries
|
2026-03-22 09:35:25 -07:00 |
|
Peter Steinberger
|
4d8106eece
|
docs(security): clarify wildcard Control UI origins
|
2026-03-17 09:36:51 -07:00 |
|
Peter Steinberger
|
cec10703dc
|
fix: unblock ci gates
|
2026-03-16 07:19:54 +00:00 |
|
Vincent Koc
|
c7137270d1
|
Security: split audit runtime surfaces
|
2026-03-15 23:30:34 -07:00 |
|
Tak Hoffman
|
fa62231afc
|
feishu: add structured card actions and interactive approval flows (#47873)
* feishu: add structured card actions and interactive approval flows
* feishu: address review fixes and test-gate regressions
* feishu: hold inflight card dedup until completion
* feishu: restore fire-and-forget bot menu handling
* feishu: format card interaction helpers
* Feishu: add changelog entry for card interactions
* Feishu: add changelog entry for ACP session binding
|
2026-03-16 01:07:09 -05:00 |
|
Vincent Koc
|
270ba54c47
|
Status: lazy-load channel security and summaries
|
2026-03-15 21:00:03 -07:00 |
|
Josh Avant
|
a2cb81199e
|
secrets: harden read-only SecretRef command paths and diagnostics (#47794)
* secrets: harden read-only SecretRef resolution for status and audit
* CLI: add SecretRef degrade-safe regression coverage
* Docs: align SecretRef status and daemon probe semantics
* Security audit: close SecretRef review gaps
* Security audit: preserve source auth SecretRef configuredness
* changelog
Signed-off-by: joshavant <830519+joshavant@users.noreply.github.com>
---------
Signed-off-by: joshavant <830519+joshavant@users.noreply.github.com>
|
2026-03-15 21:55:24 -05:00 |
|
Peter Steinberger
|
83ee5c0328
|
perf(status): defer heavy startup loading
|
2026-03-15 18:20:53 -07:00 |
|
Peter Steinberger
|
a472f988d8
|
fix: harden remote cdp probes
|
2026-03-15 08:23:01 -07:00 |
|
Josh Avant
|
0e4245063f
|
CLI: make read-only SecretRef status flows degrade safely (#37023)
* CLI: add read-only SecretRef inspection
* CLI: fix read-only SecretRef status regressions
* CLI: preserve read-only SecretRef status fallbacks
* Docs: document read-only channel inspection hook
* CLI: preserve audit coverage for read-only SecretRefs
* CLI: fix read-only status account selection
* CLI: fix targeted gateway fallback analysis
* CLI: fix Slack HTTP read-only inspection
* CLI: align audit credential status checks
* CLI: restore Telegram read-only fallback semantics
|
2026-03-05 23:07:13 -06:00 |
|
Josh Avant
|
72cf9253fc
|
Gateway: add SecretRef support for gateway.auth.token with auth-mode guardrails (#35094)
|
2026-03-05 12:53:56 -06:00 |
|
Josh Avant
|
806803b7ef
|
feat(secrets): expand SecretRef coverage across user-supplied credentials (#29580)
* feat(secrets): expand secret target coverage and gateway tooling
* docs(secrets): align gateway and CLI secret docs
* chore(protocol): regenerate swift gateway models for secrets methods
* fix(config): restore talk apiKey fallback and stabilize runner test
* ci(windows): reduce test worker count for shard stability
* ci(windows): raise node heap for test shard stability
* test(feishu): make proxy env precedence assertion windows-safe
* fix(gateway): resolve auth password SecretInput refs for clients
* fix(gateway): resolve remote SecretInput credentials for clients
* fix(secrets): skip inactive refs in command snapshot assignments
* fix(secrets): scope gateway.remote refs to effective auth surfaces
* fix(secrets): ignore memory defaults when enabled agents disable search
* fix(secrets): honor Google Chat serviceAccountRef inheritance
* fix(secrets): address tsgo errors in command and gateway collectors
* fix(secrets): avoid auth-store load in providers-only configure
* fix(gateway): defer local password ref resolution by precedence
* fix(secrets): gate telegram webhook secret refs by webhook mode
* fix(secrets): gate slack signing secret refs to http mode
* fix(secrets): skip telegram botToken refs when tokenFile is set
* fix(secrets): gate discord pluralkit refs by enabled flag
* fix(secrets): gate discord voice tts refs by voice enabled
* test(secrets): make runtime fixture modes explicit
* fix(cli): resolve local qr password secret refs
* fix(cli): fail when gateway leaves command refs unresolved
* fix(gateway): fail when local password SecretRef is unresolved
* fix(gateway): fail when required remote SecretRefs are unresolved
* fix(gateway): resolve local password refs only when password can win
* fix(cli): skip local password SecretRef resolution on qr token override
* test(gateway): cast SecretRef fixtures to OpenClawConfig
* test(secrets): activate mode-gated targets in runtime coverage fixture
* fix(cron): support SecretInput webhook tokens safely
* fix(bluebubbles): support SecretInput passwords across config paths
* fix(msteams): make appPassword SecretInput-safe in onboarding/token paths
* fix(bluebubbles): align SecretInput schema helper typing
* fix(cli): clarify secrets.resolve version-skew errors
* refactor(secrets): return structured inactive paths from secrets.resolve
* refactor(gateway): type onboarding secret writes as SecretInput
* chore(protocol): regenerate swift models for secrets.resolve
* feat(secrets): expand extension credential secretref support
* fix(secrets): gate web-search refs by active provider
* fix(onboarding): detect SecretRef credentials in extension status
* fix(onboarding): allow keeping existing ref in secret prompt
* fix(onboarding): resolve gateway password SecretRefs for probe and tui
* fix(onboarding): honor secret-input-mode for local gateway auth
* fix(acp): resolve gateway SecretInput credentials
* fix(secrets): gate gateway.remote refs to remote surfaces
* test(secrets): cover pattern matching and inactive array refs
* docs(secrets): clarify secrets.resolve and remote active surfaces
* fix(bluebubbles): keep existing SecretRef during onboarding
* fix(tests): resolve CI type errors in new SecretRef coverage
* fix(extensions): replace raw fetch with SSRF-guarded fetch
* test(secrets): mark gateway remote targets active in runtime coverage
* test(infra): normalize home-prefix expectation across platforms
* fix(cli): only resolve local qr password refs in password mode
* test(cli): cover local qr token mode with unresolved password ref
* docs(cli): clarify local qr password ref resolution behavior
* refactor(extensions): reuse sdk SecretInput helpers
* fix(wizard): resolve onboarding env-template secrets before plaintext
* fix(cli): surface secrets.resolve diagnostics in memory and qr
* test(secrets): repair post-rebase runtime and fixtures
* fix(gateway): skip remote password ref resolution when token wins
* fix(secrets): treat tailscale remote gateway refs as active
* fix(gateway): allow remote password fallback when token ref is unresolved
* fix(gateway): ignore stale local password refs for none and trusted-proxy
* fix(gateway): skip remote secret ref resolution on local call paths
* test(cli): cover qr remote tailscale secret ref resolution
* fix(secrets): align gateway password active-surface with auth inference
* fix(cli): resolve inferred local gateway password refs in qr
* fix(gateway): prefer resolvable remote password over token ref pre-resolution
* test(gateway): cover none and trusted-proxy stale password refs
* docs(secrets): sync qr and gateway active-surface behavior
* fix: restore stability blockers from pre-release audit
* Secrets: fix collector/runtime precedence contradictions
* docs: align secrets and web credential docs
* fix(rebase): resolve integration regressions after main rebase
* fix(node-host): resolve gateway secret refs for auth
* fix(secrets): harden secretinput runtime readers
* gateway: skip inactive auth secretref resolution
* cli: avoid gateway preflight for inactive secret refs
* extensions: allow unresolved refs in onboarding status
* tests: fix qr-cli module mock hoist ordering
* Security: align audit checks with SecretInput resolution
* Gateway: resolve local-mode remote fallback secret refs
* Node host: avoid resolving inactive password secret refs
* Secrets runtime: mark Slack appToken inactive for HTTP mode
* secrets: keep inactive gateway remote refs non-blocking
* cli: include agent memory secret targets in runtime resolution
* docs(secrets): sync docs with active-surface and web search behavior
* fix(secrets): keep telegram top-level token refs active for blank account tokens
* fix(daemon): resolve gateway password secret refs for probe auth
* fix(secrets): skip IRC NickServ ref resolution when NickServ is disabled
* fix(secrets): align token inheritance and exec timeout defaults
* docs(secrets): clarify active-surface notes in cli docs
* cli: require secrets.resolve gateway capability
* gateway: log auth secret surface diagnostics
* secrets: remove dead provider resolver module
* fix(secrets): restore gateway auth precedence and fallback resolution
* fix(tests): align plugin runtime mock typings
---------
Co-authored-by: Peter Steinberger <steipete@gmail.com>
|
2026-03-03 02:58:20 +00:00 |
|
Peter Steinberger
|
8ac924c769
|
refactor(security): centralize audit execution context
|
2026-03-03 02:42:43 +00:00 |
|
Peter Steinberger
|
895abc5a64
|
perf(security): allow audit snapshot and summary cache reuse
|
2026-03-03 02:32:13 +00:00 |
|
Peter Steinberger
|
132794fe74
|
feat(security): audit workspace skill symlink escapes
|
2026-03-02 23:28:54 +00:00 |
|
Peter Steinberger
|
5a32a66aa8
|
perf(core): speed up routing, pairing, slack, and security scans
|
2026-03-02 21:07:52 +00:00 |
|
Tak Hoffman
|
bbab94c1fe
|
security(feishu): bind doc create grants to trusted requester context (#31184)
Co-authored-by: Tak Hoffman <781889+Takhoffman@users.noreply.github.com>
|
2026-03-01 20:51:45 -06:00 |
|
Peter Steinberger
|
17bae93680
|
fix(security): warn on wildcard control-ui origins and feishu owner grants
|
2026-03-02 02:23:22 +00:00 |
|
Peter Steinberger
|
4355e08262
|
refactor: harden safe-bin trusted dir diagnostics
|
2026-02-24 23:29:44 +00:00 |
|
Peter Steinberger
|
4d124e4a9b
|
feat(security): warn on likely multi-user trust-model mismatch
|
2026-02-24 14:03:19 +00:00 |
|
Peter Steinberger
|
223d7dc23d
|
feat(gateway)!: require explicit non-loopback control-ui origins
|
2026-02-24 01:57:11 +00:00 |
|
Peter Steinberger
|
f52a0228ca
|
test: optimize auth and audit test runtime
|
2026-02-23 23:31:52 +00:00 |
|
Peter Steinberger
|
0d0f4c6992
|
refactor(exec): centralize safe-bin policy checks
|
2026-02-22 13:18:25 +01:00 |
|
Peter Steinberger
|
c283f87ab0
|
refactor: clarify strict loopback proxy audit rules
|
2026-02-22 11:35:08 +01:00 |
|
Peter Steinberger
|
29e41d4c0a
|
fix: land security audit severity + temp-path guard fixes (#23428) (thanks @bmendonca3)
|
2026-02-22 11:26:17 +01:00 |
|
Brian Mendonca
|
bc78b343ba
|
Security: expand audit checks for mDNS and real-IP fallback
|
2026-02-22 11:26:17 +01:00 |
|
Peter Steinberger
|
f101d59d57
|
feat(security): warn on dangerous config flags at startup
|
2026-02-22 10:11:46 +01:00 |
|
Peter Steinberger
|
265da4dd2a
|
fix(security): harden gateway command/audit guardrails
|
2026-02-22 08:45:48 +01:00 |
|
Peter Steinberger
|
1835dec200
|
fix(security): force sandbox browser hash migration and audit stale labels
|
2026-02-21 13:25:41 +01:00 |
|
Peter Steinberger
|
14b0d2b816
|
refactor: harden control-ui auth flow and add insecure-flag audit summary
|
2026-02-21 13:18:23 +01:00 |
|
Peter Steinberger
|
99048dbec2
|
fix(gateway): align insecure-auth toggle messaging
|
2026-02-21 12:57:22 +01:00 |
|
Coy Geek
|
40a292619e
|
fix: Control UI Insecure Auth Bypass Allows Token-Only Auth Over HTTP (#20684)
Merged via /review-pr -> /prepare-pr -> /merge-pr.
Prepared head SHA: ad9be4b4d6
Co-authored-by: coygeek <65363919+coygeek@users.noreply.github.com>
Co-authored-by: mbelinky <132747814+mbelinky@users.noreply.github.com>
Reviewed-by: @mbelinky
|
2026-02-20 17:34:34 +00:00 |
|
Peter Steinberger
|
f76f98b268
|
chore: fix formatting drift and stabilize cron tool mocks
|
2026-02-19 15:41:38 +01:00 |
|
Peter Steinberger
|
b40821b068
|
fix: harden ACP secret handling and exec preflight boundaries
|
2026-02-19 15:34:20 +01:00 |
|
Peter Steinberger
|
268b0dc921
|
style: fix formatting drift in security allowlist checks
|
2026-02-19 13:31:01 +00:00 |
|
Peter Steinberger
|
e3e0ffd801
|
feat(security): audit gateway HTTP no-auth exposure
|
2026-02-19 14:25:56 +01:00 |
|
the sun gif man
|
114736ed1a
|
Doctor/Security: fix telegram numeric ID + symlink config permission warnings (#19844)
Merged via /review-pr -> /prepare-pr -> /merge-pr.
Prepared head SHA: e42bf1e48d
Co-authored-by: joshp123 <1497361+joshp123@users.noreply.github.com>
Co-authored-by: joshp123 <1497361+joshp123@users.noreply.github.com>
Reviewed-by: @joshp123
|
2026-02-18 00:09:51 -08:00 |
|
Peter Steinberger
|
b8b43175c5
|
style: align formatting with oxfmt 0.33
|
2026-02-18 01:34:35 +00:00 |
|
Peter Steinberger
|
31f9be126c
|
style: run oxfmt and fix gate failures
|
2026-02-18 01:29:02 +00:00 |
|
cpojer
|
d0cb8c19b2
|
chore: wtf.
|
2026-02-17 13:36:48 +09:00 |
|
Sebastian
|
ed11e93cf2
|
chore(format)
|
2026-02-16 23:20:16 -05:00 |
|
cpojer
|
90ef2d6bdf
|
chore: Update formatting.
|
2026-02-17 09:18:40 +09:00 |
|
Peter Steinberger
|
887b209db4
|
fix(security): harden sandbox docker config validation
|
2026-02-16 03:04:06 +01:00 |
|