feat(security): add gateway network exposure check to doctor#2016
Merged
steipete merged 1 commit intoopenclaw:mainfrom Jan 26, 2026
Merged
feat(security): add gateway network exposure check to doctor#2016steipete merged 1 commit intoopenclaw:mainfrom
steipete merged 1 commit intoopenclaw:mainfrom
Conversation
thewilloftheshadow
added a commit
that referenced
this pull request
Jan 26, 2026
Co-authored-by: Alex Alaniz <[email protected]>
Member
|
Squash-merged into
|
…Alex-Alaniz) Co-authored-by: Alex Alaniz <[email protected]>
889d386 to
3c08f86
Compare
Contributor
|
Landed via temp rebase onto main.
Thanks @Alex-Alaniz! |
Contributor
|
Landed via temp rebase onto main. Thanks @Alex-Alaniz! |
tyler6204
added a commit
that referenced
this pull request
Jan 27, 2026
* fix(voice-call): validate provider credentials from env vars The `validateProviderConfig()` function now checks both config values AND environment variables when validating provider credentials. This aligns the validation behavior with `resolveProvider()` which already falls back to env vars. Previously, users who set credentials via environment variables would get validation errors even though the credentials would be found at runtime. The error messages correctly suggested env vars as an alternative, but the validation didn't actually check them. Affects all three supported providers: Twilio, Telnyx, and Plivo. Fixes
Summary
Adds security check to
clawdbot doctorthat warns users when their gateway is bound to a network interface without proper authentication.923 Clawdbot instances are currently exposed on Shodan with no auth.
The Problem
While Clawdbot's onboarding flow has safeguards (defaulting to
loopbackand forcing auth when exposed), these checks:clawdbot onboard- not on config edits or startup--bind all) or manual config editingChanges
Adds to
src/commands/doctor-security.ts:bind ∈ {all, lan, 0.0.0.0}ANDauth.mode == offTest Plan
Related
clawdbot doctor#2015🤖 Generated with Claude Code