| Version | Supported |
|---|---|
| 3.x | Yes |
| 2.x | No |
If you discover a security vulnerability, please disclose it responsibly.
- Create public issues for security problems
- Disclose vulnerabilities publicly before they're fixed
- Email: security@koompi.ai
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if known)
- We'll acknowledge within 48 hours
- We'll provide a fix timeline within 7 days
- We'll coordinate disclosure with you
- Never commit
.envfiles — they contain API keys and tokens - Set proper permissions:
chmod 600 ~/.openclaw/*/brain/.env - Keep OpenClaw updated — auto-updates are enabled by default
- Use allowlist for Telegram — only your user ID can chat by default
- Rotate keys regularly — especially if you suspect exposure
- Check logs periodically —
journalctl --user -u openclaw -b
- The agent runs with your user permissions — it can access your files
- API keys are stored in plaintext
.envfiles (standard for Unix) - Telegram communication is encrypted, but bot tokens are sensitive
- The agent executes commands via shell — be careful with
/modeland/run