From 8f5f599a343d274b11c7d63e873d80eef1abcbeb Mon Sep 17 00:00:00 2001 From: Peter Steinberger Date: Wed, 25 Feb 2026 05:10:06 +0000 Subject: [PATCH] docs(security): note narrow filesystem roots for tool access --- docs/gateway/security/index.md | 1 + 1 file changed, 1 insertion(+) diff --git a/docs/gateway/security/index.md b/docs/gateway/security/index.md index c9c3f4051..3824d1d28 100644 --- a/docs/gateway/security/index.md +++ b/docs/gateway/security/index.md @@ -837,6 +837,7 @@ Additional hardening options: - `tools.exec.applyPatch.workspaceOnly: true` (default): ensures `apply_patch` cannot write/delete outside the workspace directory even when sandboxing is off. Set to `false` only if you intentionally want `apply_patch` to touch files outside the workspace. - `tools.fs.workspaceOnly: true` (optional): restricts `read`/`write`/`edit`/`apply_patch` paths and native prompt image auto-load paths to the workspace directory (useful if you allow absolute paths today and want a single guardrail). +- Keep filesystem roots narrow: avoid broad roots like your home directory for agent workspaces/sandbox workspaces. Broad roots can expose sensitive local files (for example state/config under `~/.openclaw`) to filesystem tools. ### 5) Secure baseline (copy/paste)