Files
openclaw/INCIDENT_RESPONSE.md
2026-04-11 01:43:58 +01:00

2.4 KiB

OpenClaw Incident Response Plan

1. Detection and triage

We monitor security signals from:

  • GitHub Security Advisories (GHSA) and private vulnerability reports.
  • Public GitHub issues/discussions when reports are not sensitive.
  • Official plublic discussion groups and channels (i.e. Discord and X).
  • Automated signals (for example Dependabot, CodeQL, npm advisories, and secret scanning).

Initial triage:

  1. Confirm affected component, version, and trust boundary impact.
  2. Classify as security issue vs hardening/no-action using the repository SECURITY.md scope and out-of-scope rules.
  3. An incident owner responds accordingly.

2. Assessment

Severity guide:

  • Critical: Package/release/repository compromise, active exploitation, or unauthenticated trust-boundary bypass with high-impact control or data exposure.
  • High: Verified trust-boundary bypass requiring limited preconditions (for example authenticated but unauthorized high-impact action), or exposure of OpenClaw-owned sensitive credentials.
  • Medium: Significant security weakness with practical impact but constrained exploitability or substantial prerequisites.
  • Low: Defense-in-depth findings, narrowly scoped denial-of-service, or hardening/parity gaps without a demonstrated trust-boundary bypass.

3. Response

  1. Acknowledge receipt to the reporter (private when sensitive).
  2. Reproduce on supported releases and latest main, then implement and validate a patch with regression coverage.
  3. For critical/high incidents, prepare patched release(s) as fast as practical.
  4. For medium/low incidents, patch in normal release flow and document mitigation guidance.

4. Communication

We communicate through:

  • GitHub Security Advisories in the affected repository.
  • Release notes/changelog entries for fixed versions.
  • Direct reporter follow-up on status and resolution.

Disclosure policy:

  • Critical/high incidents should receive coordinated disclosure, with CVE issuance when appropriate.
  • Low-risk hardening findings may be documented in release notes or advisories without CVE, depending on impact and user exposure.

5. Recovery and follow-up

After shipping the fix:

  1. Verify remediations in CI and release artifacts.
  2. Run a short post-incident review (timeline, root cause, detection gap, prevention plan).
  3. Add follow-up hardening/tests/docs tasks and track them to completion.