/** * Synchronous security audit collector functions. * * These functions analyze config-based security properties without I/O. */ import type { SandboxToolPolicy } from "../agents/sandbox/types.js"; import type { OpenClawConfig } from "../config/config.js"; import type { AgentToolsConfig } from "../config/types.tools.js"; import { isToolAllowedByPolicies } from "../agents/pi-tools.policy.js"; import { resolveSandboxConfigForAgent, resolveSandboxToolPolicyForAgent, } from "../agents/sandbox.js"; import { getBlockedBindReason } from "../agents/sandbox/validate-sandbox-security.js"; import { resolveToolProfilePolicy } from "../agents/tool-policy.js"; import { resolveBrowserConfig } from "../browser/config.js"; import { formatCliCommand } from "../cli/command-format.js"; import { resolveGatewayAuth } from "../gateway/auth.js"; import { resolveNodeCommandAllowlist } from "../gateway/node-command-policy.js"; import { inferParamBFromIdOrName } from "../shared/model-param-b.js"; import { pickSandboxToolPolicy } from "./audit-tool-policy.js"; export type SecurityAuditFinding = { checkId: string; severity: "info" | "warn" | "critical"; title: string; detail: string; remediation?: string; }; const SMALL_MODEL_PARAM_B_MAX = 300; // -------------------------------------------------------------------------- // Helpers // -------------------------------------------------------------------------- function summarizeGroupPolicy(cfg: OpenClawConfig): { open: number; allowlist: number; other: number; } { const channels = cfg.channels as Record | undefined; if (!channels || typeof channels !== "object") { return { open: 0, allowlist: 0, other: 0 }; } let open = 0; let allowlist = 0; let other = 0; for (const value of Object.values(channels)) { if (!value || typeof value !== "object") { continue; } const section = value as Record; const policy = section.groupPolicy; if (policy === "open") { open += 1; } else if (policy === "allowlist") { allowlist += 1; } else { other += 1; } } return { open, allowlist, other }; } function isProbablySyncedPath(p: string): boolean { const s = p.toLowerCase(); return ( s.includes("icloud") || s.includes("dropbox") || s.includes("google drive") || s.includes("googledrive") || s.includes("onedrive") ); } function looksLikeEnvRef(value: string): boolean { const v = value.trim(); return v.startsWith("${") && v.endsWith("}"); } function isGatewayRemotelyExposed(cfg: OpenClawConfig): boolean { const bind = typeof cfg.gateway?.bind === "string" ? cfg.gateway.bind : "loopback"; if (bind !== "loopback") { return true; } const tailscaleMode = cfg.gateway?.tailscale?.mode ?? "off"; return tailscaleMode === "serve" || tailscaleMode === "funnel"; } type ModelRef = { id: string; source: string }; function addModel(models: ModelRef[], raw: unknown, source: string) { if (typeof raw !== "string") { return; } const id = raw.trim(); if (!id) { return; } models.push({ id, source }); } function collectModels(cfg: OpenClawConfig): ModelRef[] { const out: ModelRef[] = []; addModel(out, cfg.agents?.defaults?.model?.primary, "agents.defaults.model.primary"); for (const f of cfg.agents?.defaults?.model?.fallbacks ?? []) { addModel(out, f, "agents.defaults.model.fallbacks"); } addModel(out, cfg.agents?.defaults?.imageModel?.primary, "agents.defaults.imageModel.primary"); for (const f of cfg.agents?.defaults?.imageModel?.fallbacks ?? []) { addModel(out, f, "agents.defaults.imageModel.fallbacks"); } const list = Array.isArray(cfg.agents?.list) ? cfg.agents?.list : []; for (const agent of list ?? []) { if (!agent || typeof agent !== "object") { continue; } const id = typeof (agent as { id?: unknown }).id === "string" ? (agent as { id: string }).id : ""; const model = (agent as { model?: unknown }).model; if (typeof model === "string") { addModel(out, model, `agents.list.${id}.model`); } else if (model && typeof model === "object") { addModel(out, (model as { primary?: unknown }).primary, `agents.list.${id}.model.primary`); const fallbacks = (model as { fallbacks?: unknown }).fallbacks; if (Array.isArray(fallbacks)) { for (const f of fallbacks) { addModel(out, f, `agents.list.${id}.model.fallbacks`); } } } } return out; } const LEGACY_MODEL_PATTERNS: Array<{ id: string; re: RegExp; label: string }> = [ { id: "openai.gpt35", re: /\bgpt-3\.5\b/i, label: "GPT-3.5 family" }, { id: "anthropic.claude2", re: /\bclaude-(instant|2)\b/i, label: "Claude 2/Instant family" }, { id: "openai.gpt4_legacy", re: /\bgpt-4-(0314|0613)\b/i, label: "Legacy GPT-4 snapshots" }, ]; const WEAK_TIER_MODEL_PATTERNS: Array<{ id: string; re: RegExp; label: string }> = [ { id: "anthropic.haiku", re: /\bhaiku\b/i, label: "Haiku tier (smaller model)" }, ]; function isGptModel(id: string): boolean { return /\bgpt-/i.test(id); } function isGpt5OrHigher(id: string): boolean { return /\bgpt-5(?:\b|[.-])/i.test(id); } function isClaudeModel(id: string): boolean { return /\bclaude-/i.test(id); } function isClaude45OrHigher(id: string): boolean { // Match claude-*-4-5+, claude-*-45+, claude-*4.5+, or future 5.x+ majors. return /\bclaude-[^\s/]*?(?:-4-?(?:[5-9]|[1-9]\d)\b|4\.(?:[5-9]|[1-9]\d)\b|-[5-9](?:\b|[.-]))/i.test( id, ); } function extractAgentIdFromSource(source: string): string | null { const match = source.match(/^agents\.list\.([^.]*)\./); return match?.[1] ?? null; } function hasConfiguredDockerConfig( docker: Record | undefined | null, ): docker is Record { if (!docker || typeof docker !== "object") { return false; } return Object.values(docker).some((value) => value !== undefined); } function normalizeNodeCommand(value: unknown): string { return typeof value === "string" ? value.trim() : ""; } function listKnownNodeCommands(cfg: OpenClawConfig): Set { const baseCfg: OpenClawConfig = { ...cfg, gateway: { ...cfg.gateway, nodes: { ...cfg.gateway?.nodes, denyCommands: [], }, }, }; const out = new Set(); for (const platform of ["ios", "android", "macos", "linux", "windows", "unknown"]) { const allow = resolveNodeCommandAllowlist(baseCfg, { platform }); for (const cmd of allow) { const normalized = normalizeNodeCommand(cmd); if (normalized) { out.add(normalized); } } } return out; } function looksLikeNodeCommandPattern(value: string): boolean { if (!value) { return false; } if (/[?*[\]{}(),|]/.test(value)) { return true; } if ( value.startsWith("/") || value.endsWith("/") || value.startsWith("^") || value.endsWith("$") ) { return true; } return /\s/.test(value) || value.includes("group:"); } function resolveToolPolicies(params: { cfg: OpenClawConfig; agentTools?: AgentToolsConfig; sandboxMode?: "off" | "non-main" | "all"; agentId?: string | null; }): SandboxToolPolicy[] { const policies: SandboxToolPolicy[] = []; const profile = params.agentTools?.profile ?? params.cfg.tools?.profile; const profilePolicy = resolveToolProfilePolicy(profile); if (profilePolicy) { policies.push(profilePolicy); } const globalPolicy = pickSandboxToolPolicy(params.cfg.tools ?? undefined); if (globalPolicy) { policies.push(globalPolicy); } const agentPolicy = pickSandboxToolPolicy(params.agentTools); if (agentPolicy) { policies.push(agentPolicy); } if (params.sandboxMode === "all") { const sandboxPolicy = resolveSandboxToolPolicyForAgent(params.cfg, params.agentId ?? undefined); policies.push(sandboxPolicy); } return policies; } function hasWebSearchKey(cfg: OpenClawConfig, env: NodeJS.ProcessEnv): boolean { const search = cfg.tools?.web?.search; return Boolean( search?.apiKey || search?.perplexity?.apiKey || env.BRAVE_API_KEY || env.PERPLEXITY_API_KEY || env.OPENROUTER_API_KEY, ); } function isWebSearchEnabled(cfg: OpenClawConfig, env: NodeJS.ProcessEnv): boolean { const enabled = cfg.tools?.web?.search?.enabled; if (enabled === false) { return false; } if (enabled === true) { return true; } return hasWebSearchKey(cfg, env); } function isWebFetchEnabled(cfg: OpenClawConfig): boolean { const enabled = cfg.tools?.web?.fetch?.enabled; if (enabled === false) { return false; } return true; } function isBrowserEnabled(cfg: OpenClawConfig): boolean { try { return resolveBrowserConfig(cfg.browser, cfg).enabled; } catch { return true; } } function listGroupPolicyOpen(cfg: OpenClawConfig): string[] { const out: string[] = []; const channels = cfg.channels as Record | undefined; if (!channels || typeof channels !== "object") { return out; } for (const [channelId, value] of Object.entries(channels)) { if (!value || typeof value !== "object") { continue; } const section = value as Record; if (section.groupPolicy === "open") { out.push(`channels.${channelId}.groupPolicy`); } const accounts = section.accounts; if (accounts && typeof accounts === "object") { for (const [accountId, accountVal] of Object.entries(accounts)) { if (!accountVal || typeof accountVal !== "object") { continue; } const acc = accountVal as Record; if (acc.groupPolicy === "open") { out.push(`channels.${channelId}.accounts.${accountId}.groupPolicy`); } } } } return out; } // -------------------------------------------------------------------------- // Exported collectors // -------------------------------------------------------------------------- export function collectAttackSurfaceSummaryFindings(cfg: OpenClawConfig): SecurityAuditFinding[] { const group = summarizeGroupPolicy(cfg); const elevated = cfg.tools?.elevated?.enabled !== false; const webhooksEnabled = cfg.hooks?.enabled === true; const internalHooksEnabled = cfg.hooks?.internal?.enabled === true; const browserEnabled = cfg.browser?.enabled ?? true; const detail = `groups: open=${group.open}, allowlist=${group.allowlist}` + `\n` + `tools.elevated: ${elevated ? "enabled" : "disabled"}` + `\n` + `hooks.webhooks: ${webhooksEnabled ? "enabled" : "disabled"}` + `\n` + `hooks.internal: ${internalHooksEnabled ? "enabled" : "disabled"}` + `\n` + `browser control: ${browserEnabled ? "enabled" : "disabled"}`; return [ { checkId: "summary.attack_surface", severity: "info", title: "Attack surface summary", detail, }, ]; } export function collectSyncedFolderFindings(params: { stateDir: string; configPath: string; }): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; if (isProbablySyncedPath(params.stateDir) || isProbablySyncedPath(params.configPath)) { findings.push({ checkId: "fs.synced_dir", severity: "warn", title: "State/config path looks like a synced folder", detail: `stateDir=${params.stateDir}, configPath=${params.configPath}. Synced folders (iCloud/Dropbox/OneDrive/Google Drive) can leak tokens and transcripts onto other devices.`, remediation: `Keep OPENCLAW_STATE_DIR on a local-only volume and re-run "${formatCliCommand("openclaw security audit --fix")}".`, }); } return findings; } export function collectSecretsInConfigFindings(cfg: OpenClawConfig): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; const password = typeof cfg.gateway?.auth?.password === "string" ? cfg.gateway.auth.password.trim() : ""; if (password && !looksLikeEnvRef(password)) { findings.push({ checkId: "config.secrets.gateway_password_in_config", severity: "warn", title: "Gateway password is stored in config", detail: "gateway.auth.password is set in the config file; prefer environment variables for secrets when possible.", remediation: "Prefer OPENCLAW_GATEWAY_PASSWORD (env) and remove gateway.auth.password from disk.", }); } const hooksToken = typeof cfg.hooks?.token === "string" ? cfg.hooks.token.trim() : ""; if (cfg.hooks?.enabled === true && hooksToken && !looksLikeEnvRef(hooksToken)) { findings.push({ checkId: "config.secrets.hooks_token_in_config", severity: "info", title: "Hooks token is stored in config", detail: "hooks.token is set in the config file; keep config perms tight and treat it like an API secret.", }); } return findings; } export function collectHooksHardeningFindings( cfg: OpenClawConfig, env: NodeJS.ProcessEnv = process.env, ): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; if (cfg.hooks?.enabled !== true) { return findings; } const token = typeof cfg.hooks?.token === "string" ? cfg.hooks.token.trim() : ""; if (token && token.length < 24) { findings.push({ checkId: "hooks.token_too_short", severity: "warn", title: "Hooks token looks short", detail: `hooks.token is ${token.length} chars; prefer a long random token.`, }); } const gatewayAuth = resolveGatewayAuth({ authConfig: cfg.gateway?.auth, tailscaleMode: cfg.gateway?.tailscale?.mode ?? "off", env, }); const openclawGatewayToken = typeof env.OPENCLAW_GATEWAY_TOKEN === "string" && env.OPENCLAW_GATEWAY_TOKEN.trim() ? env.OPENCLAW_GATEWAY_TOKEN.trim() : null; const gatewayToken = gatewayAuth.mode === "token" && typeof gatewayAuth.token === "string" && gatewayAuth.token.trim() ? gatewayAuth.token.trim() : openclawGatewayToken ? openclawGatewayToken : null; if (token && gatewayToken && token === gatewayToken) { findings.push({ checkId: "hooks.token_reuse_gateway_token", severity: "warn", title: "Hooks token reuses the Gateway token", detail: "hooks.token matches gateway.auth token; compromise of hooks expands blast radius to the Gateway API.", remediation: "Use a separate hooks.token dedicated to hook ingress.", }); } const rawPath = typeof cfg.hooks?.path === "string" ? cfg.hooks.path.trim() : ""; if (rawPath === "/") { findings.push({ checkId: "hooks.path_root", severity: "critical", title: "Hooks base path is '/'", detail: "hooks.path='/' would shadow other HTTP endpoints and is unsafe.", remediation: "Use a dedicated path like '/hooks'.", }); } const allowRequestSessionKey = cfg.hooks?.allowRequestSessionKey === true; const defaultSessionKey = typeof cfg.hooks?.defaultSessionKey === "string" ? cfg.hooks.defaultSessionKey.trim() : ""; const allowedPrefixes = Array.isArray(cfg.hooks?.allowedSessionKeyPrefixes) ? cfg.hooks.allowedSessionKeyPrefixes .map((prefix) => prefix.trim()) .filter((prefix) => prefix.length > 0) : []; const remoteExposure = isGatewayRemotelyExposed(cfg); if (!defaultSessionKey) { findings.push({ checkId: "hooks.default_session_key_unset", severity: "warn", title: "hooks.defaultSessionKey is not configured", detail: "Hook agent runs without explicit sessionKey use generated per-request keys. Set hooks.defaultSessionKey to keep hook ingress scoped to a known session.", remediation: 'Set hooks.defaultSessionKey (for example, "hook:ingress").', }); } if (allowRequestSessionKey) { findings.push({ checkId: "hooks.request_session_key_enabled", severity: remoteExposure ? "critical" : "warn", title: "External hook payloads may override sessionKey", detail: "hooks.allowRequestSessionKey=true allows `/hooks/agent` callers to choose the session key. Treat hook token holders as full-trust unless you also restrict prefixes.", remediation: "Set hooks.allowRequestSessionKey=false (recommended) or constrain hooks.allowedSessionKeyPrefixes.", }); } if (allowRequestSessionKey && allowedPrefixes.length === 0) { findings.push({ checkId: "hooks.request_session_key_prefixes_missing", severity: remoteExposure ? "critical" : "warn", title: "Request sessionKey override is enabled without prefix restrictions", detail: "hooks.allowRequestSessionKey=true and hooks.allowedSessionKeyPrefixes is unset/empty, so request payloads can target arbitrary session key shapes.", remediation: 'Set hooks.allowedSessionKeyPrefixes (for example, ["hook:"]) or disable request overrides.', }); } return findings; } export function collectGatewayHttpSessionKeyOverrideFindings( cfg: OpenClawConfig, ): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; const chatCompletionsEnabled = cfg.gateway?.http?.endpoints?.chatCompletions?.enabled === true; const responsesEnabled = cfg.gateway?.http?.endpoints?.responses?.enabled === true; if (!chatCompletionsEnabled && !responsesEnabled) { return findings; } const enabledEndpoints = [ chatCompletionsEnabled ? "/v1/chat/completions" : null, responsesEnabled ? "/v1/responses" : null, ].filter((entry): entry is string => Boolean(entry)); findings.push({ checkId: "gateway.http.session_key_override_enabled", severity: "info", title: "HTTP API session-key override is enabled", detail: `${enabledEndpoints.join(", ")} accept x-openclaw-session-key for per-request session routing. ` + "Treat API credential holders as trusted principals.", }); return findings; } export function collectSandboxDockerNoopFindings(cfg: OpenClawConfig): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; const configuredPaths: string[] = []; const agents = Array.isArray(cfg.agents?.list) ? cfg.agents.list : []; const defaultsSandbox = cfg.agents?.defaults?.sandbox; const hasDefaultDocker = hasConfiguredDockerConfig( defaultsSandbox?.docker as Record | undefined, ); const defaultMode = defaultsSandbox?.mode ?? "off"; const hasAnySandboxEnabledAgent = agents.some((entry) => { if (!entry || typeof entry !== "object" || typeof entry.id !== "string") { return false; } return resolveSandboxConfigForAgent(cfg, entry.id).mode !== "off"; }); if (hasDefaultDocker && defaultMode === "off" && !hasAnySandboxEnabledAgent) { configuredPaths.push("agents.defaults.sandbox.docker"); } for (const entry of agents) { if (!entry || typeof entry !== "object" || typeof entry.id !== "string") { continue; } if (!hasConfiguredDockerConfig(entry.sandbox?.docker as Record | undefined)) { continue; } if (resolveSandboxConfigForAgent(cfg, entry.id).mode === "off") { configuredPaths.push(`agents.list.${entry.id}.sandbox.docker`); } } if (configuredPaths.length === 0) { return findings; } findings.push({ checkId: "sandbox.docker_config_mode_off", severity: "warn", title: "Sandbox docker settings configured while sandbox mode is off", detail: "These docker settings will not take effect until sandbox mode is enabled:\n" + configuredPaths.map((entry) => `- ${entry}`).join("\n"), remediation: 'Enable sandbox mode (`agents.defaults.sandbox.mode="non-main"` or `"all"`) where needed, or remove unused docker settings.', }); return findings; } export function collectSandboxDangerousConfigFindings(cfg: OpenClawConfig): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; const agents = Array.isArray(cfg.agents?.list) ? cfg.agents.list : []; const configs: Array<{ source: string; docker: Record }> = []; const defaultDocker = cfg.agents?.defaults?.sandbox?.docker; if (defaultDocker && typeof defaultDocker === "object") { configs.push({ source: "agents.defaults.sandbox.docker", docker: defaultDocker as Record, }); } for (const entry of agents) { if (!entry || typeof entry !== "object" || typeof entry.id !== "string") { continue; } const agentDocker = entry.sandbox?.docker; if (agentDocker && typeof agentDocker === "object") { configs.push({ source: `agents.list.${entry.id}.sandbox.docker`, docker: agentDocker as Record, }); } } for (const { source, docker } of configs) { const binds = Array.isArray(docker.binds) ? docker.binds : []; for (const bind of binds) { if (typeof bind !== "string") { continue; } const blocked = getBlockedBindReason(bind); if (!blocked) { continue; } if (blocked.kind === "non_absolute") { findings.push({ checkId: "sandbox.bind_mount_non_absolute", severity: "warn", title: "Sandbox bind mount uses a non-absolute source path", detail: `${source}.binds contains "${bind}" which uses source path "${blocked.sourcePath}". ` + "Non-absolute bind sources are hard to validate safely and may resolve unexpectedly.", remediation: `Rewrite "${bind}" to use an absolute host path (for example: /home/user/project:/project:ro).`, }); continue; } const verb = blocked.kind === "covers" ? "covers" : "targets"; findings.push({ checkId: "sandbox.dangerous_bind_mount", severity: "critical", title: "Dangerous bind mount in sandbox config", detail: `${source}.binds contains "${bind}" which ${verb} blocked path "${blocked.blockedPath}". ` + "This can expose host system directories or the Docker socket to sandbox containers.", remediation: `Remove "${bind}" from ${source}.binds. Use project-specific paths instead.`, }); } const network = typeof docker.network === "string" ? docker.network : undefined; if (network && network.trim().toLowerCase() === "host") { findings.push({ checkId: "sandbox.dangerous_network_mode", severity: "critical", title: "Network host mode in sandbox config", detail: `${source}.network is "host" which bypasses container network isolation entirely.`, remediation: `Set ${source}.network to "bridge" or "none".`, }); } const seccompProfile = typeof docker.seccompProfile === "string" ? docker.seccompProfile : undefined; if (seccompProfile && seccompProfile.trim().toLowerCase() === "unconfined") { findings.push({ checkId: "sandbox.dangerous_seccomp_profile", severity: "critical", title: "Seccomp unconfined in sandbox config", detail: `${source}.seccompProfile is "unconfined" which disables syscall filtering.`, remediation: `Remove ${source}.seccompProfile or use a custom seccomp profile file.`, }); } const apparmorProfile = typeof docker.apparmorProfile === "string" ? docker.apparmorProfile : undefined; if (apparmorProfile && apparmorProfile.trim().toLowerCase() === "unconfined") { findings.push({ checkId: "sandbox.dangerous_apparmor_profile", severity: "critical", title: "AppArmor unconfined in sandbox config", detail: `${source}.apparmorProfile is "unconfined" which disables AppArmor enforcement.`, remediation: `Remove ${source}.apparmorProfile or use a named AppArmor profile.`, }); } } return findings; } export function collectNodeDenyCommandPatternFindings(cfg: OpenClawConfig): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; const denyListRaw = cfg.gateway?.nodes?.denyCommands; if (!Array.isArray(denyListRaw) || denyListRaw.length === 0) { return findings; } const denyList = denyListRaw.map(normalizeNodeCommand).filter(Boolean); if (denyList.length === 0) { return findings; } const knownCommands = listKnownNodeCommands(cfg); const patternLike = denyList.filter((entry) => looksLikeNodeCommandPattern(entry)); const unknownExact = denyList.filter( (entry) => !looksLikeNodeCommandPattern(entry) && !knownCommands.has(entry), ); if (patternLike.length === 0 && unknownExact.length === 0) { return findings; } const detailParts: string[] = []; if (patternLike.length > 0) { detailParts.push( `Pattern-like entries (not supported by exact matching): ${patternLike.join(", ")}`, ); } if (unknownExact.length > 0) { detailParts.push( `Unknown command names (not in defaults/allowCommands): ${unknownExact.join(", ")}`, ); } const examples = Array.from(knownCommands).slice(0, 8); findings.push({ checkId: "gateway.nodes.deny_commands_ineffective", severity: "warn", title: "Some gateway.nodes.denyCommands entries are ineffective", detail: "gateway.nodes.denyCommands uses exact command-name matching only.\n" + detailParts.map((entry) => `- ${entry}`).join("\n"), remediation: `Use exact command names (for example: ${examples.join(", ")}). ` + "If you need broader restrictions, remove risky commands from allowCommands/default workflows.", }); return findings; } export function collectMinimalProfileOverrideFindings(cfg: OpenClawConfig): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; if (cfg.tools?.profile !== "minimal") { return findings; } const overrides = (cfg.agents?.list ?? []) .filter((entry): entry is { id: string; tools?: AgentToolsConfig } => { return Boolean( entry && typeof entry === "object" && typeof entry.id === "string" && entry.tools?.profile && entry.tools.profile !== "minimal", ); }) .map((entry) => `${entry.id}=${entry.tools?.profile}`); if (overrides.length === 0) { return findings; } findings.push({ checkId: "tools.profile_minimal_overridden", severity: "warn", title: "Global tools.profile=minimal is overridden by agent profiles", detail: "Global minimal profile is set, but these agent profiles take precedence:\n" + overrides.map((entry) => `- agents.list.${entry}`).join("\n"), remediation: 'Set those agents to `tools.profile="minimal"` (or remove the agent override) if you want minimal tools enforced globally.', }); return findings; } export function collectModelHygieneFindings(cfg: OpenClawConfig): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; const models = collectModels(cfg); if (models.length === 0) { return findings; } const weakMatches = new Map(); const addWeakMatch = (model: string, source: string, reason: string) => { const key = `${model}@@${source}`; const existing = weakMatches.get(key); if (!existing) { weakMatches.set(key, { model, source, reasons: [reason] }); return; } if (!existing.reasons.includes(reason)) { existing.reasons.push(reason); } }; for (const entry of models) { for (const pat of WEAK_TIER_MODEL_PATTERNS) { if (pat.re.test(entry.id)) { addWeakMatch(entry.id, entry.source, pat.label); break; } } if (isGptModel(entry.id) && !isGpt5OrHigher(entry.id)) { addWeakMatch(entry.id, entry.source, "Below GPT-5 family"); } if (isClaudeModel(entry.id) && !isClaude45OrHigher(entry.id)) { addWeakMatch(entry.id, entry.source, "Below Claude 4.5"); } } const matches: Array<{ model: string; source: string; reason: string }> = []; for (const entry of models) { for (const pat of LEGACY_MODEL_PATTERNS) { if (pat.re.test(entry.id)) { matches.push({ model: entry.id, source: entry.source, reason: pat.label }); break; } } } if (matches.length > 0) { const lines = matches .slice(0, 12) .map((m) => `- ${m.model} (${m.reason}) @ ${m.source}`) .join("\n"); const more = matches.length > 12 ? `\n…${matches.length - 12} more` : ""; findings.push({ checkId: "models.legacy", severity: "warn", title: "Some configured models look legacy", detail: "Older/legacy models can be less robust against prompt injection and tool misuse.\n" + lines + more, remediation: "Prefer modern, instruction-hardened models for any bot that can run tools.", }); } if (weakMatches.size > 0) { const lines = Array.from(weakMatches.values()) .slice(0, 12) .map((m) => `- ${m.model} (${m.reasons.join("; ")}) @ ${m.source}`) .join("\n"); const more = weakMatches.size > 12 ? `\n…${weakMatches.size - 12} more` : ""; findings.push({ checkId: "models.weak_tier", severity: "warn", title: "Some configured models are below recommended tiers", detail: "Smaller/older models are generally more susceptible to prompt injection and tool misuse.\n" + lines + more, remediation: "Use the latest, top-tier model for any bot with tools or untrusted inboxes. Avoid Haiku tiers; prefer GPT-5+ and Claude 4.5+.", }); } return findings; } export function collectSmallModelRiskFindings(params: { cfg: OpenClawConfig; env: NodeJS.ProcessEnv; }): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; const models = collectModels(params.cfg).filter((entry) => !entry.source.includes("imageModel")); if (models.length === 0) { return findings; } const smallModels = models .map((entry) => { const paramB = inferParamBFromIdOrName(entry.id); if (!paramB || paramB > SMALL_MODEL_PARAM_B_MAX) { return null; } return { ...entry, paramB }; }) .filter((entry): entry is { id: string; source: string; paramB: number } => Boolean(entry)); if (smallModels.length === 0) { return findings; } let hasUnsafe = false; const modelLines: string[] = []; const exposureSet = new Set(); for (const entry of smallModels) { const agentId = extractAgentIdFromSource(entry.source); const sandboxMode = resolveSandboxConfigForAgent(params.cfg, agentId ?? undefined).mode; const agentTools = agentId && params.cfg.agents?.list ? params.cfg.agents.list.find((agent) => agent?.id === agentId)?.tools : undefined; const policies = resolveToolPolicies({ cfg: params.cfg, agentTools, sandboxMode, agentId, }); const exposed: string[] = []; if (isWebSearchEnabled(params.cfg, params.env)) { if (isToolAllowedByPolicies("web_search", policies)) { exposed.push("web_search"); } } if (isWebFetchEnabled(params.cfg)) { if (isToolAllowedByPolicies("web_fetch", policies)) { exposed.push("web_fetch"); } } if (isBrowserEnabled(params.cfg)) { if (isToolAllowedByPolicies("browser", policies)) { exposed.push("browser"); } } for (const tool of exposed) { exposureSet.add(tool); } const sandboxLabel = sandboxMode === "all" ? "sandbox=all" : `sandbox=${sandboxMode}`; const exposureLabel = exposed.length > 0 ? ` web=[${exposed.join(", ")}]` : " web=[off]"; const safe = sandboxMode === "all" && exposed.length === 0; if (!safe) { hasUnsafe = true; } const statusLabel = safe ? "ok" : "unsafe"; modelLines.push( `- ${entry.id} (${entry.paramB}B) @ ${entry.source} (${statusLabel}; ${sandboxLabel};${exposureLabel})`, ); } const exposureList = Array.from(exposureSet); const exposureDetail = exposureList.length > 0 ? `Uncontrolled input tools allowed: ${exposureList.join(", ")}.` : "No web/browser tools detected for these models."; findings.push({ checkId: "models.small_params", severity: hasUnsafe ? "critical" : "info", title: "Small models require sandboxing and web tools disabled", detail: `Small models (<=${SMALL_MODEL_PARAM_B_MAX}B params) detected:\n` + modelLines.join("\n") + `\n` + exposureDetail + `\n` + "Small models are not recommended for untrusted inputs.", remediation: 'If you must use small models, enable sandboxing for all sessions (agents.defaults.sandbox.mode="all") and disable web_search/web_fetch/browser (tools.deny=["group:web","browser"]).', }); return findings; } export function collectExposureMatrixFindings(cfg: OpenClawConfig): SecurityAuditFinding[] { const findings: SecurityAuditFinding[] = []; const openGroups = listGroupPolicyOpen(cfg); if (openGroups.length === 0) { return findings; } const elevatedEnabled = cfg.tools?.elevated?.enabled !== false; if (elevatedEnabled) { findings.push({ checkId: "security.exposure.open_groups_with_elevated", severity: "critical", title: "Open groupPolicy with elevated tools enabled", detail: `Found groupPolicy="open" at:\n${openGroups.map((p) => `- ${p}`).join("\n")}\n` + "With tools.elevated enabled, a prompt injection in those rooms can become a high-impact incident.", remediation: `Set groupPolicy="allowlist" and keep elevated allowlists extremely tight.`, }); } return findings; }