Honor owner enforcement for native commands [AI]#78864
Honor owner enforcement for native commands [AI]#78864pgondhi987 merged 5 commits intoopenclaw:mainfrom
Conversation
|
Codex review: needs real behavior proof before merge. Summary Reproducibility: yes. from source inspection: current main computes native fallback without checking plugin owner enforcement, and the existing resolver test asserts the old allowed-native behavior. I did not run tests because this review was required to keep the checkout read-only. Real behavior proof Next step before merge Security Review findings
Review detailsBest possible solution: Land a narrow auth fix that makes native and text command authorization honor the existing owner-enforcement contract, with targeted regression tests, a changelog entry, and redacted real behavior proof from the contributor. Do we have a high-confidence way to reproduce the issue? Yes, from source inspection: current main computes native fallback without checking plugin owner enforcement, and the existing resolver test asserts the old allowed-native behavior. I did not run tests because this review was required to keep the checkout read-only. Is this the best way to solve the issue? Mostly yes: changing the native fallback to respect Full review comments:
Overall correctness: patch is correct Acceptance criteria:
What I checked:
Likely related people:
Remaining risk / open question:
Codex review notes: model gpt-5.5, reasoning high; reviewed against 1831e124b221. |
|
Not applicable; changelog is handled at merge time. Quoted comment from @clawsweeper:
|
* fix: honor owner enforcement for native commands * addressing codex review * addressing codex review * docs: add changelog entry for PR merge
* fix: honor owner enforcement for native commands * addressing codex review * addressing codex review * docs: add changelog entry for PR merge
* fix: honor owner enforcement for native commands * addressing codex review * addressing codex review * docs: add changelog entry for PR merge
Summary
AI-assisted: Yes
Change Type (select all)
Scope (select all touched areas)
Linked Issue/PR
Real behavior proof (required for external PRs)
Root Cause (if applicable)
Regression Test Plan (if applicable)
src/auto-reply/command-control.test.ts,src/auto-reply/reply/commands-stop-target.test.ts,src/auto-reply/reply/commands-subagents-routing.test.tsisAuthorizedSender.User-visible / Behavior Changes
Native slash commands on plugins that enforce owner-only commands now require owner authorization for authorized-sender-only command handlers.
Diagram (if applicable)
N/A
Security Impact (required)
Yes/No) NoYes/No) NoYes/No) NoYes/No) YesYes/No) NoYes, explain risk + mitigation: Native command eligibility is narrowed when owner enforcement is active. Regression tests cover the resolver and representative command handlers.Repro + Verification
Environment
commands.enforceOwnerForCommands=true, channelallowFromincludes wildcard, no explicit owner allowlistSteps
/stopand/subagents spawnusing the resolved command authorization.Expected
Actual
Evidence
Attach at least one:
Pending targeted validation output.
Human Verification (required)
What you personally verified (not just CI), and how:
Review Conversations
Compatibility / Migration
Yes/No) YesYes/No) NoYes/No) NoRisks and Mitigations