This repository is an operations toolkit. Security-sensitive areas include:
- SSH access to OpenClaw host
- Watchdog shared secret and Telegram bot token
- OpenClaw config backups (especially with
--include-secrets)
- Do not commit any
.envfiles with real values. - Use
examples/*.env.exampletemplates only. - Rotate secrets immediately if exposed in logs/chat/commits.
- Store backups containing secrets in encrypted storage.
- Use SSH key auth instead of password auth.
- Limit who can run
oc101on operator machines. - Keep OpenClaw and system packages updated.
- Run
openclaw security auditregularly.
If you discover a vulnerability in this toolkit, open a private report to repository maintainers and include:
- impact
- reproduction steps
- proposed mitigation