bugfix:The Mintlify navbar (logo + search bar with ⌘K) scrolls away w…#2445
Merged
vignesh07 merged 2 commits intoopenclaw:mainfrom Jan 27, 2026
Merged
bugfix:The Mintlify navbar (logo + search bar with ⌘K) scrolls away w…#2445vignesh07 merged 2 commits intoopenclaw:mainfrom
vignesh07 merged 2 commits intoopenclaw:mainfrom
Conversation
Contributor
Author
|
fix: #2430 |
Contributor
|
CI lint is failing due to an unused type import in Suggested fix: diff --git a/src/infra/heartbeat-visibility.ts b/src/infra/heartbeat-visibility.ts
@@
-import type { DeliverableMessageChannel, GatewayMessageChannel } from "../utils/message-channel.js";
+import type { GatewayMessageChannel } from "../utils/message-channel.js";I verified locally that this makes |
vignesh07
added a commit
to chenyuan99/clawdbot
that referenced
this pull request
Jan 27, 2026
Contributor
Author
|
Thanks @vignesh07 |
…hen scrolling down the documentation, so it disappears from view.
Contributor
|
Landed + merged (squash).
Thanks @chenyuan99! |
tyler6204
added a commit
that referenced
this pull request
Jan 27, 2026
* fix(voice-call): validate provider credentials from env vars The `validateProviderConfig()` function now checks both config values AND environment variables when validating provider credentials. This aligns the validation behavior with `resolveProvider()` which already falls back to env vars. Previously, users who set credentials via environment variables would get validation errors even though the credentials would be found at runtime. The error messages correctly suggested env vars as an alternative, but the validation didn't actually check them. Affects all three supported providers: Twilio, Telnyx, and Plivo. Fixes #1709 Co-Authored-By: Claude <[email protected]> * Add per-sender group tool policies * fix(msteams): correct typing indicator sendActivity call * fix: require gateway auth by default * docs: harden VPS install defaults * security: add mDNS discovery config to reduce information disclosure (#1882) * security: add mDNS discovery config to reduce information disclosure mDNS broadcasts can expose sensitive operational details like filesystem paths (cliPath) and SSH availability (sshPort) to anyone on the local network. This information aids reconnaissance and should be minimized for gateways exposed beyond trusted networks. Changes: - Add discovery.mdns.enabled config option to disable mDNS entirely - Add discovery.mdns.minimal option to omit cliPath/sshPort from TXT records - Update security docs with operational security guidance Minimal mode still broadcasts enough for device discovery (role, gatewayPort, transport) while omitting details that help map the host environment. Apps that need CLI path can fetch it via the authenticated WebSocket. * fix: default mDNS discovery mode to minimal (#1882) (thanks @orlyjamie) --------- Co-authored-by: theonejvo <[email protected]> Co-authored-by: Peter Steinberger <[email protected]> * fix(security): prevent prompt injection via external hooks (gmail, we… (
…hen scrolling down the documentation, so it disappears from view.