mirror of
https://github.com/openclaw/openclaw.git
synced 2026-04-12 01:31:08 +00:00
2.4 KiB
2.4 KiB
OpenClaw Incident Response Plan
1. Detection and triage
We monitor security signals from:
- GitHub Security Advisories (GHSA) and private vulnerability reports.
- Public GitHub issues/discussions when reports are not sensitive.
- Official plublic discussion groups and channels (i.e. Discord and X).
- Automated signals (for example Dependabot, CodeQL, npm advisories, and secret scanning).
Initial triage:
- Confirm affected component, version, and trust boundary impact.
- Classify as security issue vs hardening/no-action using the repository
SECURITY.mdscope and out-of-scope rules. - An incident owner responds accordingly.
2. Assessment
Severity guide:
- Critical: Package/release/repository compromise, active exploitation, or unauthenticated trust-boundary bypass with high-impact control or data exposure.
- High: Verified trust-boundary bypass requiring limited preconditions (for example authenticated but unauthorized high-impact action), or exposure of OpenClaw-owned sensitive credentials.
- Medium: Significant security weakness with practical impact but constrained exploitability or substantial prerequisites.
- Low: Defense-in-depth findings, narrowly scoped denial-of-service, or hardening/parity gaps without a demonstrated trust-boundary bypass.
3. Response
- Acknowledge receipt to the reporter (private when sensitive).
- Reproduce on supported releases and latest
main, then implement and validate a patch with regression coverage. - For critical/high incidents, prepare patched release(s) as fast as practical.
- For medium/low incidents, patch in normal release flow and document mitigation guidance.
4. Communication
We communicate through:
- GitHub Security Advisories in the affected repository.
- Release notes/changelog entries for fixed versions.
- Direct reporter follow-up on status and resolution.
Disclosure policy:
- Critical/high incidents should receive coordinated disclosure, with CVE issuance when appropriate.
- Low-risk hardening findings may be documented in release notes or advisories without CVE, depending on impact and user exposure.
5. Recovery and follow-up
After shipping the fix:
- Verify remediations in CI and release artifacts.
- Run a short post-incident review (timeline, root cause, detection gap, prevention plan).
- Add follow-up hardening/tests/docs tasks and track them to completion.