惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

U
Unit 42
V
V2EX
Martin Fowler
Martin Fowler
博客园 - Franky
P
Proofpoint News Feed
P
Palo Alto Networks Blog
H
Hackread – Cybersecurity News, Data Breaches, AI and More
B
Blog
The Register - Security
The Register - Security
Latest news
Latest news
S
Security @ Cisco Blogs
Simon Willison's Weblog
Simon Willison's Weblog
Recorded Future
Recorded Future
大猫的无限游戏
大猫的无限游戏
M
Microsoft Research Blog - Microsoft Research
Scott Helme
Scott Helme
T
Tailwind CSS Blog
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
Application and Cybersecurity Blog
Application and Cybersecurity Blog
T
True Tiger Recordings
有赞技术团队
有赞技术团队
I
Intezer
Cisco Talos Blog
Cisco Talos Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
The GitHub Blog
The GitHub Blog
cs.AI updates on arXiv.org
cs.AI updates on arXiv.org
T
Tenable Blog
博客园 - 叶小钗
Hugging Face - Blog
Hugging Face - Blog
Hacker News: Ask HN
Hacker News: Ask HN
S
Security Archives - TechRepublic
F
Future of Privacy Forum
爱范儿
爱范儿
PCI Perspectives
PCI Perspectives
H
Help Net Security
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
T
The Blog of Author Tim Ferriss
MyScale Blog
MyScale Blog
N
Netflix TechBlog - Medium
罗磊的独立博客
Apple Machine Learning Research
Apple Machine Learning Research
MongoDB | Blog
MongoDB | Blog
Security Latest
Security Latest
美团技术团队
博客园 - 三生石上(FineUI控件)
S
Schneier on Security
量子位
C
CERT Recently Published Vulnerability Notes
SecWiki News
SecWiki News

Recent Commits to openclaw:main

perf(whatsapp): narrow runtime setter entry (#85589) · openclaw/openclaw@463929d fix: smooth chat focus mode layout · openclaw/openclaw@bb5abef Fix Telegram missing harness spool poison (#85605) · openclaw/openclaw@b745082 fix(session): surface previous-transcript archive failures on /new ro… fix(installer): fail failed Windows git builds · openclaw/openclaw@2edd6e2 fix(codex): honor node exec policy for native surfaces (#85534) · openclaw/openclaw@e0405ec fix(qa-lab): stabilize codex runtime parity fixtures fix(github): preserve sufficient proof against negative relabel (#85567) · openclaw/openclaw@6b52dff docs: add changelog for context pressure preflight · openclaw/openclaw@5ca734f Fix context pressure preflight for tool-heavy sessions (#85541) · openclaw/openclaw@c08400e fix(doctor): classify codex asset notice as info (#85119) · openclaw/openclaw@959b935 fix(ui): keep chat picker search current (#85547) fix: preserve message-tool delivery evidence · openclaw/openclaw@f022b05 fix(codex): add API key paste auth (#85533) fix: satisfy openai video test typecheck · openclaw/openclaw@743caed fix: route openai video edits to edits endpoint · openclaw/openclaw@6c3fcb8 fix(qmd): normalize direct file collection paths (#65212) · openclaw/openclaw@227b4bf fix(testbox): preserve clean sparse checkouts · openclaw/openclaw@58e9628 fix(ui): run ui script through junction paths (#85525) · openclaw/openclaw@ad19dd8 docs: fix troubleshooting logs link (#85545) · openclaw/openclaw@60582b6 Revert chat session picker inline search (#85527) · openclaw/openclaw@d69bcfd fix: preserve guarded video operation cleanup · openclaw/openclaw@ed7d99a fix: honor openai video provider request network policy fix: retry guarded video downloads · openclaw/openclaw@efbf9f3 fix: thread openai video request policy · openclaw/openclaw@31b5145 docs(changelog): note heartbeat message-tool fix · openclaw/openclaw@c127334 fix: use fs-safe trash for agent delete (#84394) · openclaw/openclaw@951bbe6 Fix heartbeat message-tool delivery policy (#85357) · openclaw/openclaw@bd9c78f Scope config preflight note suppression (#84439) · openclaw/openclaw@91d85e7 fix(cron): document best-effort edit delivery mode (#84526) fix(dreaming): open report cards from memory palace (#85144) · openclaw/openclaw@2e15830 fix(openai-codex): preserve image input capability (#85393) · openclaw/openclaw@49ce171 fix(codex): stabilize heartbeat dynamic tool schema (#84681) · openclaw/openclaw@c52daa4 docs: absorb small documentation PRs · openclaw/openclaw@658be7f fix(scripts): preserve bws resolver parse errors (#85528) · openclaw/openclaw@13a4c57 fix(telegram): honor outbound media max bytes (#83478) · openclaw/openclaw@f2d4f93 fix(skills): restore executable bit on bundled whisper script + relea… · openclaw/openclaw@1dd3b52 fix(google): print Gemini OAuth URL before browser launch (#71469) · openclaw/openclaw@2d5bda9 docs: absorb contributor documentation fixes docs: tighten landable bug sweep gates · openclaw/openclaw@8f86383 fix: reuse provider auth lookup facts (#85499) · openclaw/openclaw@299ed80 fix: keep session picker focus separate · openclaw/openclaw@7e12370 feat: start onboarding for fresh CLI installs (#85519) · openclaw/openclaw@464ffc1 docs: refresh contributor docs · openclaw/openclaw@64d13c0 fix(update): prepack npm git update specs · openclaw/openclaw@84f6b5c fix: simplify chat session search · openclaw/openclaw@7e16a50 fix: use native mac settings sidebar · openclaw/openclaw@0556958 chore: ignore antigravity cli state · openclaw/openclaw@dd07fb4 fix(media): replace Gemini CLI fallback with sandboxed Antigravity (#… · openclaw/openclaw@0622fb6 docs: add bugbash landing changelog entries · openclaw/openclaw@faad2b0 fix(diffs): continue after card hydration errors (#84775) · openclaw/openclaw@9b5c281 fix(proxy): add missing clientSocket error handler in CONNECT tunnel … · openclaw/openclaw@e008bc9 fix(memory): report qmd workspace cwd probe failures (#63167) · openclaw/openclaw@7134a95 fix(agents): handle parallel tool call deltas in openai-completions s… test: align release validation package acceptance check (#85515) · openclaw/openclaw@423f525 fix: recover stuck Codex compaction · openclaw/openclaw@44d5330 docs: require visual proof for control ui e2e (#85513) · openclaw/openclaw@8174bfc Policy: add gateway exposure checks (#81981) · openclaw/openclaw@dcc5e45 ci: unblock advisory Tideclaw alpha release checks · openclaw/openclaw@dcfc7e5 fix(installer): tolerate WSL UNC launch cwd · openclaw/openclaw@684a9b2 docs: absorb docs sweep · openclaw/openclaw@bb5010b fix: cancel stale provider auth prewarms (#85503) · openclaw/openclaw@60e3749 Add TUI PTY integration coverage (#85485) · openclaw/openclaw@0a50cbd fix(security): escape entry.id in HTML export to prevent attribute XS… · openclaw/openclaw@7bc4a33 fix: guard openai-completions tool payload with supportsTools compat … · openclaw/openclaw@76a025c fix(slack): surface auth.test failure + normalize explicit-bot mentio… · openclaw/openclaw@995a020 chore(release): bump version to 2026.5.22 fix(ui): keep chat session search inline (#85490) · openclaw/openclaw@2601453 Policy: add secret and auth conformance checks (#81974) · openclaw/openclaw@c85feac fix(delivery): log failDelivery errors instead of silently swallowing… · openclaw/openclaw@f75789f fix(cli): validate debug proxy numeric options (#84260) · openclaw/openclaw@5c866a1 fix(daemon): use exit code instead of localized text for schtasks fal… · openclaw/openclaw@501e74d fix(auto-reply): enforce word boundary in slash command prefix match … · openclaw/openclaw@5c614de fix(message-tool): normalize send body aliases (#84102) docs: absorb maintainer docs sweep · openclaw/openclaw@e0fda55 fix(gateway): coalesce provider auth rewarms docs(voyage): clarify API key setup (#81803) · openclaw/openclaw@57178b1 docs(config): quote bracket config paths (#83058) · openclaw/openclaw@88f50e8 docs: link Copilot model availability (#76252) · openclaw/openclaw@14b2b8a test(telegram): await watchdog registration event · openclaw/openclaw@9fae5f7 ci: run binding command escape in release checks · openclaw/openclaw@4b63502 fix(tui): dismiss watchdog notice when response actually arrives (#77… · openclaw/openclaw@b741ddb test: add docker proof for plugin binding command escape · openclaw/openclaw@d756e1c test(telegram): wait for polling watchdog deterministically · openclaw/openclaw@7c9127c ci: skip pnpm auto repair in Crabbox shell · openclaw/openclaw@0241a6e fix(gateway): add .catch() to SIGTERM/SIGUSR1 signal handlers (#83131) fix: release cron runtime state after isolated runs (#85053) · openclaw/openclaw@247e536 fix(cron): suppress fatal error completion announce (#83724) · openclaw/openclaw@0c7220f fix(exec): parse nested approval metadata in async followups (#72268) · openclaw/openclaw@34c441c ci: share Crabbox hydrate pnpm store · openclaw/openclaw@7552634 chore(release): refresh plugin SDK baseline · openclaw/openclaw@736e7de ci(release): harden node setup before pnpm cache · openclaw/openclaw@a26aba6 ci(release): pass node pin to pnpm setup ci: use stable pnpm wrapper for Crabbox hydrate · openclaw/openclaw@b00d306 docs: refine maintainer docs sweep docs(memory): add guidance for action-sensitive memories (#82788) · openclaw/openclaw@bd04b1e docs(feishu): add dynamicAgentCreation and per-user isolation docs (#… docs(secrets): clarify agent-readable plaintext boundary (#84574) · openclaw/openclaw@ce5dcb0 docs(channels): document ackReactionScope for Slack & Telegram (DM go… · openclaw/openclaw@bbbed26 build(pnpm): use packageManager as pnpm source · openclaw/openclaw@a0702e1
Policy: add agent workspace conformance checks (#85096) · openclaw/openclaw@a94f344
giodl73-repo · 2026-05-23 · via Recent Commits to openclaw:main

@@ -18,15 +18,17 @@ report drift through `doctor --lint`. The final conformance signal is a clean

1818

instead of creating a separate health gate.

19192020

Policy currently manages configured channels, MCP servers, model providers,

21-

network SSRF posture, Gateway exposure posture, OpenClaw config secret

22-

provider/auth profile posture, and governed tool declarations. For example, IT

23-

or a workspace operator can record that Telegram is not an approved channel

24-

provider, restrict MCP servers and model refs to approved entries, require

25-

private-network fetch/browser access to remain disabled, require Gateway

26-

bind/auth/HTTP exposure to stay within reviewed bounds, require OpenClaw config

27-

SecretRefs to use managed providers, require config auth profiles to carry

28-

provider/mode metadata, require governed tools to carry risk and sensitivity

29-

metadata, then use `doctor --lint` as the shared conformance gate.

21+

network SSRF posture, Gateway exposure posture, agent workspace posture,

22+

OpenClaw config secret provider/auth profile posture, and governed tool

23+

declarations. For example, IT or a workspace operator can record that Telegram

24+

is not an approved channel provider, restrict MCP servers and model refs to

25+

approved entries, require private-network fetch/browser access to remain

26+

disabled, require Gateway bind/auth/HTTP exposure to stay within reviewed

27+

bounds, require agent workspace access and tool denies to stay in a reviewed

28+

posture, require OpenClaw config SecretRefs to use managed providers, require

29+

config auth profiles to carry provider/mode metadata, require governed tools to

30+

carry risk and sensitivity metadata, then use `doctor --lint` as the shared

31+

conformance gate.

30323133

Use policy when a workspace needs a durable statement such as "these channels

3234

must not be enabled" or "governed tools must declare approval metadata" and a

@@ -48,8 +50,8 @@ doctor can report the missing artifact.

48504951

Policy is authored, not generated from the user's current settings. A minimal

5052

policy for channels, MCP servers, model providers, network posture, Gateway

51-

exposure, OpenClaw config secret provider/auth profile posture, and tool

52-

metadata looks like this:

53+

exposure, agent workspace posture, OpenClaw config secret provider/auth profile

54+

posture, and tool metadata looks like this:

53555456

```jsonc

5557

{

@@ -99,6 +101,12 @@ metadata looks like this:

99101

"requireUrlAllowlists": true,

100102

},

101103

},

104+

"agents": {

105+

"workspace": {

106+

"allowedAccess": ["none", "ro"],

107+

"denyTools": ["exec", "process", "write", "edit", "apply_patch"],

108+

},

109+

},

102110

"secrets": {

103111

"requireManagedProviders": true,

104112

"denySources": ["exec"],

@@ -120,11 +128,17 @@ The rules are the authority. A category block is only a namespace; checks run

120128

when a concrete rule is present. OpenClaw reads current `channels.*` settings

121129

`mcp.servers.*`, `models.providers.*`, selected agent model refs, network SSRF

122130

settings, Gateway bind/auth/Control UI/Tailscale/remote/HTTP posture, OpenClaw

123-

config secret provider and SecretRef provenance, config auth profile metadata,

124-

and `TOOLS.md` declarations as evidence, then reports observed state that does

125-

not conform. If a policy denies non-loopback Gateway binds, omit `gateway.bind`

126-

only when you are willing to review the runtime default; set

127-

`gateway.bind=loopback` for strict config conformance. Secret evidence records

131+

config agent sandbox workspace access and tool deny posture, config secret

132+

provider and SecretRef provenance, config auth profile metadata, and `TOOLS.md`

133+

declarations as evidence, then reports observed state that does not conform. If

134+

a policy denies non-loopback Gateway binds, omit `gateway.bind` only when you

135+

are willing to review the runtime default; set `gateway.bind=loopback` for

136+

strict config conformance. For read-only agent posture, configure sandbox mode

137+

on the applicable defaults or agent and set `workspaceAccess` to `none` or

138+

`ro`; omitted or `off` sandbox mode does not satisfy a read-only/no-write

139+

policy. `agents.workspace.denyTools` supports `exec`, `process`, `write`,

140+

`edit`, and `apply_patch`; OpenClaw config `group:fs` covers file mutation tools

141+

and `group:runtime` covers shell/process tools. Secret evidence records

128142

provider/source posture and SecretRef metadata, never raw secret values. Policy

129143

does not read or attest per-agent credential stores such as `auth-profiles.json`;

130144

those stores remain owned by the existing auth and credential flows.

@@ -270,6 +284,28 @@ Example JSON output:

270284

"explicit": true

271285

}

272286

],

287+

"agentWorkspace": [

288+

{

289+

"id": "agents-defaults-workspace-access",

290+

"kind": "workspaceAccess",

291+

"source": "oc://openclaw.config/agents/defaults/sandbox/workspaceAccess",

292+

"scope": "defaults",

293+

"value": "ro",

294+

"sandboxMode": "all",

295+

"sandboxModeSource": "oc://openclaw.config/agents/defaults/sandbox/mode",

296+

"sandboxEnabled": true,

297+

"explicit": true

298+

},

299+

{

300+

"id": "agents-defaults-tool-exec",

301+

"kind": "toolDeny",

302+

"source": "oc://openclaw.config/tools/deny",

303+

"scope": "defaults",

304+

"tool": "exec",

305+

"denied": true,

306+

"explicit": true

307+

}

308+

],

273309

"secrets": [

274310

{

275311

"id": "vault",

@@ -306,7 +342,7 @@ Example JSON output:

306342

}

307343

]

308344

},

309-

"checksRun": 28,

345+

"checksRun": 30,

310346

"checksSkipped": 0,

311347

"findings": []

312348

}

@@ -339,6 +375,10 @@ If policy rules change intentionally, update both accepted hashes from a clean

339375

check. If workspace settings change intentionally but policy stays the same,

340376

only `expectedAttestationHash` usually changes.

341377378+

Enabling or upgrading `agents.workspace` rules adds `agentWorkspace` evidence to

379+

the workspace hash and attestation hash. Operators should review the new

380+

evidence and refresh accepted attestation hashes after enabling these rules.

381+342382

`openclaw policy watch` runs the same check repeatedly and reports when the

343383

current evidence no longer matches `expectedAttestationHash`:

344384

@@ -374,6 +414,8 @@ Policy currently verifies:

374414

| `policy/gateway-remote-enabled` | Gateway remote mode is active when policy denies it. |

375415

| `policy/gateway-http-endpoint-enabled` | A Gateway HTTP API endpoint is enabled while denied by policy. |

376416

| `policy/gateway-http-url-fetch-unrestricted` | Gateway HTTP URL-fetch input lacks a required URL allowlist. |

417+

| `policy/agents-workspace-access-denied` | Agent sandbox mode or workspace access is outside the policy allowlist. |

418+

| `policy/agents-tool-not-denied` | An agent or default config does not deny a tool required by policy. |

377419

| `policy/secrets-unmanaged-provider` | A config SecretRef references a provider not declared under `secrets.providers`. |

378420

| `policy/secrets-denied-provider-source` | A config secret provider or SecretRef uses a source denied by policy. |

379421

| `policy/secrets-insecure-provider` | A secret provider opts into insecure posture when policy denies it. |

@@ -483,6 +525,21 @@ Example Gateway exposure finding:

483525

}

484526

```

485527528+

Example agent workspace finding:

529+530+

```json

531+

{

532+

"checkId": "policy/agents-workspace-access-denied",

533+

"severity": "error",

534+

"message": "agents.defaults sandbox workspaceAccess 'rw' is not allowed by policy.",

535+

"source": "policy",

536+

"path": "openclaw config",

537+

"ocPath": "oc://openclaw.config/agents/defaults/sandbox/workspaceAccess",

538+

"target": "oc://openclaw.config/agents/defaults/sandbox/workspaceAccess",

539+

"requirement": "oc://policy.jsonc/agents/workspace/allowedAccess"

540+

}

541+

```

542+486543

## Repair

487544488545

`doctor --lint` and `policy check` are read-only.