fix(daemon): harden launchd plist with umask 077#31919
Merged
steipete merged 2 commits intoopenclaw:mainfrom Mar 2, 2026
Merged
fix(daemon): harden launchd plist with umask 077#31919steipete merged 2 commits intoopenclaw:mainfrom
steipete merged 2 commits intoopenclaw:mainfrom
Conversation
Contributor
Greptile SummaryAdds Key changes:
Security impact:
Confidence Score: 5/5
Last reviewed commit: d748b87 |
d748b87 to
49b6dc4
Compare
Contributor
|
Landed via temp rebase onto main.
Thanks @liuxiaopai-ai! |
Contributor
|
Corrected SHA details for landed rebase flow: Thanks @liuxiaopai-ai! |
This was referenced Mar 2, 2026
execute008
pushed a commit
to execute008/openclaw
that referenced
this pull request
Mar 2, 2026
* fix(daemon): add launchd umask hardening * fix: finalize launchd umask changelog + thanks (openclaw#31919) (thanks @liuxiaopai-ai) --------- Co-authored-by: Peter Steinberger <[email protected]>
dawi369
pushed a commit
to dawi369/davis
that referenced
this pull request
Mar 3, 2026
* fix(daemon): add launchd umask hardening * fix: finalize launchd umask changelog + thanks (openclaw#31919) (thanks @liuxiaopai-ai) --------- Co-authored-by: Peter Steinberger <[email protected]>
OWALabuy
pushed a commit
to kcinzgg/openclaw
that referenced
this pull request
Mar 4, 2026
* fix(daemon): add launchd umask hardening * fix: finalize launchd umask changelog + thanks (openclaw#31919) (thanks @liuxiaopai-ai) --------- Co-authored-by: Peter Steinberger <[email protected]>
zooqueen
pushed a commit
to hanzoai/bot
that referenced
this pull request
Mar 6, 2026
* fix(daemon): add launchd umask hardening * fix: finalize launchd umask changelog + thanks (openclaw#31919) (thanks @liuxiaopai-ai) --------- Co-authored-by: Peter Steinberger <[email protected]>
alexey-pelykh
pushed a commit
to remoteclaw/remoteclaw
that referenced
this pull request
Mar 17, 2026
* fix(daemon): add launchd umask hardening * fix: finalize launchd umask changelog + thanks (openclaw#31919) (thanks @liuxiaopai-ai) --------- Co-authored-by: Peter Steinberger <[email protected]> (cherry picked from commit 718d418)
alexey-pelykh
pushed a commit
to remoteclaw/remoteclaw
that referenced
this pull request
Mar 17, 2026
* fix(daemon): add launchd umask hardening * fix: finalize launchd umask changelog + thanks (openclaw#31919) (thanks @liuxiaopai-ai) --------- Co-authored-by: Peter Steinberger <[email protected]> (cherry picked from commit 718d418)
alexey-pelykh
added a commit
to remoteclaw/remoteclaw
that referenced
this pull request
Mar 17, 2026
* fix(security): harden tar archive extraction parity (cherry picked from commit 0dbb92d) * fix: harden sandbox writes and centralize atomic file writes (cherry picked from commit 18f8393) * refactor(security): split sandbox media staging and stream safe copies (cherry picked from commit 4a80311) * fix(security): harden workspace bootstrap boundary reads (cherry picked from commit 07b16d5) * fix: harden webhook auth-before-body handling (cherry picked from commit d3e8b17) * refactor(security): unify hardened install and fs write flows (cherry picked from commit d4bf07d) * fix(security): harden zip write race handling (cherry picked from commit 7dac9b0) * refactor(security): split gateway auth suites and share safe write path checks (cherry picked from commit 83c8406) * fix(daemon): harden launchd plist with umask 077 (openclaw#31919) * fix(daemon): add launchd umask hardening * fix: finalize launchd umask changelog + thanks (openclaw#31919) (thanks @liuxiaopai-ai) --------- Co-authored-by: Peter Steinberger <[email protected]> (cherry picked from commit 718d418) * test(guardrails): exclude suite files and harden auth temp identity naming (cherry picked from commit a8fe8b6) * fix: harden plugin command registration + telegram menu guard (openclaw#31997) (thanks @liuxiaopai-ai) (cherry picked from commit ee68fa8) * fix: rebrand openclaw refs from cherry-picks * fix: adapt cherry-picks for fork TS strictness - bluebubbles/monitor.test.ts: OpenClawConfig → RemoteClawConfig (rebrand miss) - bluebubbles/monitor.ts, googlechat/monitor.ts: registerWebhookTargetWithPluginRoute → registerWebhookTarget (upstream refactored function not in fork plugin-sdk) - sandbox/workspace.test.ts: remove orphaned test for gutted sandbox workspace module - skills-install-extract.ts: fix hasBinary import from deleted skills.js → shared/config-eval.js - fs-safe.ts: add missing pipeline import, OPEN_WRITE_*_FLAGS constants, assertNoPathAliasEscape stub, and openVerifiedLocalFile options parameter - fs-safe.test.ts: add missing writeFileWithinRoot/copyFileWithinRoot/writeFileFromPathWithinRoot imports from fs-safe.js - install-safe-path.ts: add assertCanonicalPathWithinBase (upstream definition from unmerged PR) - install-package-dir.ts: add missing assertCanonicalPathWithinBase import Co-Authored-By: Claude Opus 4.6 (1M context) <[email protected]> * fix: wire hardlink rejection in openFileWithinRoot * fix(security): unify root-bound write hardening (cherry picked from commit 104d32b) --------- Co-authored-by: Peter Steinberger <[email protected]> Co-authored-by: Mark L <[email protected]> Co-authored-by: Claude Opus 4.6 (1M context) <[email protected]>
lukeg826
pushed a commit
to lukeg826/openclaw
that referenced
this pull request
Mar 26, 2026
* fix(daemon): add launchd umask hardening * fix: finalize launchd umask changelog + thanks (openclaw#31919) (thanks @liuxiaopai-ai) --------- Co-authored-by: Peter Steinberger <[email protected]>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Umask=077to generated macOS gateway LaunchAgent plist output.Umaskemission in generated plist.Change Type (select all)
Scope (select all touched areas)
Linked Issue/PR
User-visible / Behavior Changes
openclaw gateway installon macOS now writes LaunchAgent plist entries withUmaskset to 077 (decimal 63), preserving owner-only default file creation behavior after upgrades.Security Impact (required)
No)No)No)No)No)Yes, explain risk + mitigation:Repro + Verification
Environment
Steps
Expected
Umaskwith decimal value 63 (octal 077).Actual
Evidence
Human Verification (required)
src/daemon/launchd.test.tsnow assertsUmaskexists in generated plist.KeepAlive,ThrottleInterval, env dict) unaffected.Compatibility / Migration
Yes)No)No)Failure Recovery (if this breaks)
src/daemon/launchd-plist.tssrc/daemon/launchd.test.tsUmaskkey in newly generated LaunchAgent plist files.Risks and Mitigations