Skip to content

Security: elucid/moltbot

Security

SECURITY.md

Security Policy

If you believe you've found a security issue in OpenClaw, please report it privately.

Reporting

Report vulnerabilities directly to the repository where the issue lives:

For issues that don't fit a specific repo, or if you're unsure, email security@openclaw.ai and we'll route it.

For full reporting instructions see our Trust page.

Required in Reports

  1. Title
  2. Severity Assessment
  3. Impact
  4. Affected Component
  5. Technical Reproduction
  6. Demonstrated Impact
  7. Environment
  8. Remediation Advice

Reports without reproduction steps, demonstrated impact, and remediation advice will be deprioritized. Given the volume of AI-generated scanner findings, we must ensure we're receiving vetted reports from researchers who understand the issues.

Security & Trust

Jamieson O'Reilly (@theonejvo) is Security & Trust at OpenClaw. Jamieson is the founder of Dvuln and brings extensive experience in offensive security, penetration testing, and security program development.

Bug Bounties

OpenClaw is a labor of love. There is no bug bounty program and no budget for paid reports. Please still disclose responsibly so we can fix issues quickly. The best way to help the project right now is by sending PRs.

Maintainers: GHSA Updates via CLI

When patching a GHSA via gh api, include X-GitHub-Api-Version: 2022-11-28 (or newer). Without it, some fields (notably CVSS) may not persist even if the request returns 200.

Out of Scope

  • Public Internet Exposure
  • Using OpenClaw in ways that the docs recommend not to
  • Prompt injection attacks

Operational Guidance

For threat model + hardening guidance (including openclaw security audit --deep and --fix), see:

  • https://docs.openclaw.ai/gateway/security

Tool filesystem hardening

  • tools.exec.applyPatch.workspaceOnly: true (recommended): keeps apply_patch writes/deletes within the configured workspace directory.
  • tools.fs.workspaceOnly: true (optional): restricts read/write/edit/apply_patch paths to the workspace directory.
  • Avoid setting tools.exec.applyPatch.workspaceOnly: false unless you fully trust who can trigger tool execution.

Web Interface Safety

OpenClaw's web interface (Gateway Control UI + HTTP endpoints) is intended for local use only.

  • Recommended: keep the Gateway loopback-only (127.0.0.1 / ::1).
    • Config: gateway.bind="loopback" (default).
    • CLI: openclaw gateway run --bind loopback.
  • Do not expose it to the public internet (no direct bind to 0.0.0.0, no public reverse proxy). It is not hardened for public exposure.
  • If you need remote access, prefer an SSH tunnel or Tailscale serve/funnel (so the Gateway still binds to loopback), plus strong Gateway auth.
  • The Gateway HTTP surface includes the canvas host (/__openclaw__/canvas/, /__openclaw__/a2ui/). Treat canvas content as sensitive/untrusted and avoid exposing it beyond loopback unless you understand the risk.

Runtime Requirements

Node.js Version

OpenClaw requires Node.js 22.12.0 or later (LTS). This version includes important security patches:

  • CVE-2025-59466: async_hooks DoS vulnerability
  • CVE-2026-21636: Permission model bypass vulnerability

Verify your Node.js version:

node --version  # Should be v22.12.0 or later

Docker Security

When running OpenClaw in Docker:

  1. The official image runs as a non-root user (node) for reduced attack surface
  2. Use --read-only flag when possible for additional filesystem protection
  3. Limit container capabilities with --cap-drop=ALL

Example secure Docker run:

docker run --read-only --cap-drop=ALL \
  -v openclaw-data:/app/data \
  openclaw/openclaw:latest

Security Scanning

This project uses detect-secrets for automated secret detection in CI/CD. See .detect-secrets.cfg for configuration and .secrets.baseline for the baseline.

Run locally:

pip install detect-secrets==1.5.0
detect-secrets scan --baseline .secrets.baseline

There aren’t any published security advisories