docs(security): document filesystem capability model#79075
docs(security): document filesystem capability model#79075dev111-actor wants to merge 1 commit intoopenclaw:mainfrom
Conversation
|
Codex review: needs maintainer review before merge. Summary Reproducibility: not applicable. this is a docs-only PR, not a reproducible runtime bug. Source inspection verifies current main lacks the new page and the PR adds the page, links, navigation entry, and changelog line. Real behavior proof Next step before merge Security Review detailsBest possible solution: Keep the architecture tracker open unless secops/maintainers explicitly decide the docs page is the terminal outcome; otherwise merge the docs as partial guidance after removing the auto-close behavior. Do we have a high-confidence way to reproduce the issue? Not applicable: this is a docs-only PR, not a reproducible runtime bug. Source inspection verifies current main lacks the new page and the PR adds the page, links, navigation entry, and changelog line. Is this the best way to solve the issue? No as written: the docs addition is a reasonable partial step, but it should not automatically close the broader protected security architecture tracker. The safer path is maintainer/secops review and either remove the closing syntax or explicitly accept the docs as terminal scope. Security concerns:
Acceptance criteria:
What I checked:
Likely related people:
Remaining risk / open question:
Codex review notes: model gpt-5.5, reasoning high; reviewed against 2597723dfcc9. |
|
Hi @steipete |
Summary
fs-safehost mutation.Change Type (select all)
Scope (select all touched areas)
Linked Issue/PR
Real behavior proof (required for external PRs)
pnpm exec oxfmt --check --threads=1 docs/gateway/security/filesystem-capability-model.md docs/gateway/security/secure-file-operations.md docs/gateway/sandboxing.md docs/gateway/security/index.md CHANGELOG.md docs/docs.json;node scripts/check-docs-mdx.mjs docs.Docs MDX check passed (620 files, 13827ms). All matched files use the correct format. Finished in 11760ms on 5 files using 1 threads.docs/docs.jsonnavigation under Security and sandboxing.Root Cause (if applicable)
For bug fixes or regressions, explain why this happened, not just what changed. Otherwise write
N/A. If the cause is unclear, writeUnknown.Regression Test Plan (if applicable)
For bug fixes or regressions, name the smallest reliable test coverage that should catch this. Otherwise write
N/A.scripts/check-docs-mdx.mjs,oxfmt.User-visible / Behavior Changes
Adds a new docs page:
https://docs.openclaw.ai/gateway/security/filesystem-capability-model.Diagram (if applicable)
Security Impact (required)
Yes/No) NoYes/No) NoYes/No) NoYes/No) NoYes/No) NoYes, explain risk + mitigation: N/ARepro + Verification
Environment
Steps
docs/gateway/security/filesystem-capability-model.md.docs/docs.jsonincludesgateway/security/filesystem-capability-modelunder Security and sandboxing.Expected
Actual
Evidence
Attach at least one:
Human Verification (required)
What you personally verified (not just CI), and how:
Review Conversations
If a bot review conversation is addressed by this PR, resolve that conversation yourself. Do not leave bot review conversation cleanup for maintainers.
Compatibility / Migration
Yes/No) YesYes/No) NoYes/No) NoRisks and Mitigations