You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs(concepts): batch readability and Mintlify component pass
- memory: replace en-dash list separators with em-dashes, sentence-case Further reading link titles
- messages: rewrite filler 'this page ties together' opener to a direct one
- delegate-architecture: convert 4 blockquote security warnings to Warning and Note components
- system-prompt: convert blockquote daily-memory note to Note component
Copy file name to clipboardExpand all lines: docs/concepts/delegate-architecture.md
+12-4Lines changed: 12 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,11 +70,15 @@ The delegate operates **autonomously** on a schedule, executing standing orders
70
70
71
71
This tier combines Tier 2 permissions with [Cron Jobs](/automation/cron-jobs) and [Standing Orders](/automation/standing-orders).
72
72
73
-
> **Security warning**: Tier 3 requires careful configuration of hard blocks — actions the agent must never take regardless of instruction. Complete the prerequisites below before granting any identity provider permissions.
73
+
<Warning>
74
+
Tier 3 requires careful configuration of hard blocks: actions the agent must never take regardless of instruction. Complete the prerequisites below before granting any identity provider permissions.
75
+
</Warning>
74
76
75
77
## Prerequisites: isolation and hardening
76
78
77
-
> **Do this first.** Before you grant any credentials or identity provider access, lock down the delegate's boundaries. The steps in this section define what the agent **cannot** do — establish these constraints before giving it the ability to do anything.
79
+
<Note>
80
+
**Do this first.** Before you grant any credentials or identity provider access, lock down the delegate's boundaries. The steps in this section define what the agent **cannot** do. Establish these constraints before giving it the ability to do anything.
81
+
</Note>
78
82
79
83
### Hard blocks (non-negotiable)
80
84
@@ -180,7 +184,9 @@ New-ApplicationAccessPolicy `
180
184
-AccessRight RestrictAccess
181
185
```
182
186
183
-
> **Security warning**: without an application access policy, `Mail.Read` application permission grants access to **every mailbox in the tenant**. Always create the access policy before the application reads any mail. Test by confirming the app returns `403` for mailboxes outside the security group.
187
+
<Warning>
188
+
Without an application access policy, `Mail.Read` application permission grants access to **every mailbox in the tenant**. Always create the access policy before the application reads any mail. Test by confirming the app returns `403` for mailboxes outside the security group.
The service account impersonates the delegate user (not the principal), preserving the "on behalf of" model.
198
204
199
-
> **Security warning**: domain-wide delegation allows the service account to impersonate **any user in the entire domain**. Restrict the scopes to the minimum required, and limit the service account's client ID to only the scopes listed above in the Admin Console (Security > API controls > Domain-wide delegation). A leaked service account key with broad scopes grants full access to every mailbox and calendar in the organization. Rotate keys on a schedule and monitor the Admin Console audit log for unexpected impersonation events.
205
+
<Warning>
206
+
Domain-wide delegation allows the service account to impersonate **any user in the entire domain**. Restrict the scopes to the minimum required, and limit the service account's client ID to only the scopes listed above in the Admin Console (Security > API controls > Domain-wide delegation). A leaked service account key with broad scopes grants full access to every mailbox and calendar in the organization. Rotate keys on a schedule and monitor the Admin Console audit log for unexpected impersonation events.
Copy file name to clipboardExpand all lines: docs/concepts/messages.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,7 @@ read_when:
7
7
title: "Messages"
8
8
---
9
9
10
-
This page ties together how OpenClaw handles inbound messages, sessions, queueing,
11
-
streaming, and reasoning visibility.
10
+
OpenClaw handles inbound messages through a pipeline of session resolution, queueing, streaming, tool execution, and reasoning visibility. This page maps the path from inbound message to reply.
Copy file name to clipboardExpand all lines: docs/concepts/system-prompt.md
+3-6Lines changed: 3 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,12 +116,9 @@ heartbeats are disabled for the default agent or
116
116
files concise — especially `MEMORY.md`, which can grow over time and lead to
117
117
unexpectedly high context usage and more frequent compaction.
118
118
119
-
> **Note:**`memory/*.md` daily files are **not** part of the normal bootstrap
120
-
> Project Context. On ordinary turns they are accessed on demand via the
121
-
> `memory_search` and `memory_get` tools, so they do not count against the
122
-
> context window unless the model explicitly reads them. Bare `/new` and
123
-
> `/reset` turns are the exception: the runtime can prepend recent daily memory
124
-
> as a one-shot startup-context block for that first turn.
119
+
<Note>
120
+
`memory/*.md` daily files are **not** part of the normal bootstrap Project Context. On ordinary turns they are accessed on demand via the `memory_search` and `memory_get` tools, so they do not count against the context window unless the model explicitly reads them. Bare `/new` and `/reset` turns are the exception: the runtime can prepend recent daily memory as a one-shot startup-context block for that first turn.
121
+
</Note>
125
122
126
123
Large files are truncated with a marker. The max per-file size is controlled by
127
124
`agents.defaults.bootstrapMaxChars` (default: 12000). Total injected bootstrap
0 commit comments