Caricamento in corso...
Caricamento in corso...
Last synced: Today, 22:00
Technical reference for the OpenClaw framework. Real-time synchronization with the official documentation engine.
Use this file to discover all available pages before exploring further.
This page tracks OpenClaw’s formal security models (TLA+/TLC today; more as needed).
Note: some older links may refer to the previous project name.
Goal (north star): provide a machine-checked argument that OpenClaw enforces its intended security policy (authorization, session isolation, tool gating, and misconfiguration safety), under explicit assumptions.
What this is (today): an executable, attacker-driven security regression suite:
What this is not (yet): a proof that “OpenClaw is secure in all respects” or that the full TypeScript implementation is correct.
Models are maintained in a separate repo: vignesh07/openclaw-formal-models.
Today, results are reproduced by cloning the models repo locally and running TLC (see below). A future iteration could offer:
Getting started:
bashgit clone https://github.com/vignesh07/openclaw-formal-models cd openclaw-formal-models # Java 11+ required (TLC runs on the JVM). # The repo vendors a pinned `tla2tools.jar` (TLA+ tools) and provides `bin/tlc` + Make targets. make <target>
Claim: binding beyond loopback without auth can make remote compromise possible / increases exposure; token/password blocks unauth attackers (per the model assumptions).
make gateway-exposure-v2make gateway-exposure-v2-protectedmake gateway-exposure-v2-negativeSee also:
docs/gateway-exposure-matrix.mdClaim:
exec host=nodemake nodes-pipelinemake approvals-tokenmake nodes-pipeline-negativemake approvals-token-negativeClaim: pairing requests respect TTL and pending-request caps.
make pairingmake pairing-capmake pairing-negativemake pairing-cap-negativeClaim: in group contexts requiring mention, an unauthorized “control command” cannot bypass mention gating.
make ingress-gatingmake ingress-gating-negativeClaim: DMs from distinct peers do not collapse into the same session unless explicitly linked/configured.
make routing-isolationmake routing-isolation-negativeThese are follow-on models that tighten fidelity around real-world failure modes (non-atomic updates, retries, and message fan-out).
Claim: a pairing store should enforce
MaxPendingWhat it means:
Under concurrent requests, you can’t exceed
MaxPendingRepeated requests/refreshes for the same
(channel, sender)Green runs:
make pairing-racemake pairing-idempotencymake pairing-refreshmake pairing-refresh-raceRed (expected):
make pairing-race-negativemake pairing-idempotency-negativemake pairing-refresh-negativemake pairing-refresh-race-negativeClaim: ingestion should preserve trace correlation across fan-out and be idempotent under provider retries.
What it means:
When one external event becomes multiple internal messages, every part keeps the same trace/event identity.
Retries do not result in double-processing.
If provider event IDs are missing, dedupe falls back to a safe key (e.g., trace ID) to avoid dropping distinct events.
Green:
make ingress-tracemake ingress-trace2make ingress-idempotencymake ingress-dedupe-fallbackRed (expected):
make ingress-trace-negativemake ingress-trace2-negativemake ingress-idempotency-negativemake ingress-dedupe-fallback-negativeClaim: routing must keep DM sessions isolated by default, and only collapse sessions when explicitly configured (channel precedence + identity links).
What it means:
Channel-specific dmScope overrides must win over global defaults.
identityLinks should collapse only within explicit linked groups, not across unrelated peers.
Green:
make routing-precedencemake routing-identitylinksRed (expected):
make routing-precedence-negativemake routing-identitylinks-negative© 2024 TaskFlow Mirror
Powered by TaskFlow Sync Engine