Files
openclaw/src/cli
Jerry-Xin 6ec4e5cf4a fix: check effective UID (geteuid) in root guard
assertNotRoot only checked process.getuid(), so the guard was bypassed
when the CLI was launched with a non-root real UID but an effective UID
of 0 (e.g. via a setuid-root wrapper). In that context the process still
has root write privileges and can cause the same state/config corruption
the guard was added to prevent.

Now checks both getuid() and geteuid() — either being 0 triggers the
guard. Added three tests covering setuid-root scenarios.
2026-05-07 23:31:03 -04:00
..
2026-05-01 22:05:19 +01:00
2026-05-04 03:31:55 -07:00
2026-05-01 22:08:43 +01:00
2026-05-02 01:11:18 +01:00
2026-04-26 10:41:03 +01:00