22d9f5b21d
Novas skills instaladas: - openclaw-agent-browser v1.0.0 CLI Chromium — navegação, login, screenshots, state - skill-security-audit v1.0.0 SAST scanning, prompt injection, secrets audit - sql-toolkit v1.0.0 PostgreSQL/MySQL/SQLite — schema, query, otimização - file v1.0.0 Organização de arquivos por contexto - file-summary v1.0.0 Extração e resumo de PDFs, Word, Excel Workspace expandido: - TOOLS.md: +Browser automation, Security audit, SQL, File management - AGENTS.md: +Linux Analyst section (comandos, logs, rede, scripts) + Full-stack strategy - MEMORY.md: 16 skills indexadas, stack map, comandos Linux ref - SESSION-STATE.md: atualizado com contexto completo - lock.json: sincronizado com 16 skills instaladas
2.8 KiB
2.8 KiB
OpenClaw Security Audit Reference
This combines findings, applied changes, and remaining remediation from a comprehensive security audit. Use as a template for auditing any OpenClaw installation.
Severity Levels & Common Findings
Critical
- Plaintext secrets in openclaw.json — API keys, bot tokens, passwords stored in cleartext. Migrate to credential store, env vars, or
tokenFilereferences. - Gateway auth disabled (
gateway.auth.mode: "none") — Anyone on the network can access the full gateway API. Set to"token"with a strong bearer token. - Open DM policies (
dmPolicy: "open"+allowFrom: ["*"]) — Anyone can message your bots. Change to"pairing"or explicit allowlists.
High
- Control UI wildcard origins (
allowedOrigins: ["*"]) — CSRF risk. Restrict to localhost. - World-readable credentials — WhatsApp session files at 644. Fix:
chmod 600. - Unencrypted node communication — Set
tls: trueinnode.json.
Medium
- Permissive directory modes —
credentials/,identity/,logs/,browser/,skills/at 755. Fix:chmod 700. - Unrestricted subagent access —
allowAgents: ["*"]lets any agent spawn as any other. Scope to specific lists. - Group bots not requiring @mention — Responds to every message, wasting tokens.
Low
- Config backup proliferation — Multiple
.bakfiles containing secrets. - Orphaned agent directories — Stale data from deleted agents.
- Unrotated logs — Gateway logs growing unbounded.
- Stale cron run logs and temp files.
Remediation Checklist Template
Immediate (Critical)
- Enable gateway auth:
openclaw config set gateway.auth.mode "token" && openclaw config set gateway.auth.token "$(openssl rand -base64 32)" - Lock Telegram DMs: change each account to
dmPolicy: "pairing", removeallowFrom: ["*"] - Fix credential permissions:
chmod 600on all credential files,chmod 700on credential directories - Migrate bot tokens to
tokenFilereferences (createcredentials/telegram/<bot>.tokenfiles at 600)
High Priority
- Restrict control UI origins to localhost
- Enable node TLS
- Fix directory permissions (700 for sensitive dirs)
Medium Priority
- Scope subagent access per agent
- Enable
requireMentionon group bots - Run
openclaw security audit --deep --fix
Maintenance
- Delete stale config backups
- Remove orphaned agent directories
- Set up log rotation
- Clean cron run logs periodically
- Remove
.DS_Storeand temp files
Post-Change Actions
openclaw gateway restart- Test all Telegram bots (existing paired users still work; new users need pairing codes)
- Verify node connectivity if TLS was changed
- Update backup after confirming new config works