Files
openclaw/docs/cli/security.md

29 lines
1.3 KiB
Markdown
Raw Permalink Normal View History

2026-01-15 06:12:54 +00:00
---
2026-01-30 03:15:10 +01:00
summary: "CLI reference for `openclaw security` (audit and fix common security footguns)"
2026-01-15 06:12:54 +00:00
read_when:
- You want to run a quick security audit on config/state
- You want to apply safe “fix” suggestions (chmod, tighten defaults)
title: "security"
2026-01-15 06:12:54 +00:00
---
2026-01-30 03:15:10 +01:00
# `openclaw security`
2026-01-15 06:12:54 +00:00
Security tools (audit + optional fixes).
Related:
2026-01-31 21:13:13 +09:00
2026-01-15 06:12:54 +00:00
- Security guide: [Security](/gateway/security)
## Audit
```bash
2026-01-30 03:15:10 +01:00
openclaw security audit
openclaw security audit --deep
openclaw security audit --fix
2026-01-15 06:12:54 +00:00
```
The audit warns when multiple DM senders share the main session and recommends **secure DM mode**: `session.dmScope="per-channel-peer"` (or `per-account-channel-peer` for multi-account channels) for shared inboxes.
2026-01-21 01:24:10 +00:00
It also warns when small models (`<=300B`) are used without sandboxing and with web/browser tools enabled.
For webhook ingress, it warns when `hooks.defaultSessionKey` is unset, when request `sessionKey` overrides are enabled, and when overrides are enabled without `hooks.allowedSessionKeyPrefixes`.
It also warns when sandbox Docker settings are configured while sandbox mode is off, when `gateway.nodes.denyCommands` uses ineffective pattern-like/unknown entries, when global `tools.profile="minimal"` is overridden by agent tool profiles, and when installed extension plugin tools may be reachable under permissive tool policy.