diff --git a/docs/gateway/remote.md b/docs/gateway/remote.md index 27ce3075aab..89f3ff59b2b 100644 --- a/docs/gateway/remote.md +++ b/docs/gateway/remote.md @@ -240,9 +240,9 @@ Stop the tunnel: launchctl bootout gui/$UID/ai.openclaw.ssh-tunnel ``` -| Config entry | What it does | -| ------------------------------------ | ------------------------------------------------------------- | -| `LocalForward 18789 127.0.0.1:18789` | Forwards local port 18789 to remote port 18789 | -| `ssh -N` | SSH without executing remote commands (port-forwarding only) | -| `KeepAlive` | Automatically restarts the tunnel if it crashes | -| `RunAtLoad` | Starts the tunnel when the LaunchAgent loads at login | +| Config entry | What it does | +| ------------------------------------ | ------------------------------------------------------------ | +| `LocalForward 18789 127.0.0.1:18789` | Forwards local port 18789 to remote port 18789 | +| `ssh -N` | SSH without executing remote commands (port-forwarding only) | +| `KeepAlive` | Automatically restarts the tunnel if it crashes | +| `RunAtLoad` | Starts the tunnel when the LaunchAgent loads at login | diff --git a/docs/security/THREAT-MODEL-ATLAS.md b/docs/security/THREAT-MODEL-ATLAS.md index ed31b585392..b1b313e7351 100644 --- a/docs/security/THREAT-MODEL-ATLAS.md +++ b/docs/security/THREAT-MODEL-ATLAS.md @@ -177,15 +177,15 @@ Nothing is explicitly out of scope for this threat model. #### T-ACCESS-001: Pairing Code Interception -| Attribute | Value | -| ----------------------- | -------------------------------------------------------- | -| **ATLAS ID** | AML.T0040 - AI Model Inference API Access | +| Attribute | Value | +| ----------------------- | ------------------------------------------------------------------------------------------------------------- | +| **ATLAS ID** | AML.T0040 - AI Model Inference API Access | | **Description** | Attacker intercepts pairing code during pairing grace period (1h for DM channel pairing, 5m for node pairing) | | **Attack Vector** | Shoulder surfing, network sniffing, social engineering | | **Affected Components** | Device pairing system | -| **Current Mitigations** | 1h expiry (DM pairing) / 5m expiry (node pairing), codes sent via existing channel | -| **Residual Risk** | Medium - Grace period exploitable | -| **Recommendations** | Reduce grace period, add confirmation step | +| **Current Mitigations** | 1h expiry (DM pairing) / 5m expiry (node pairing), codes sent via existing channel | +| **Residual Risk** | Medium - Grace period exploitable | +| **Recommendations** | Reduce grace period, add confirmation step | #### T-ACCESS-002: AllowFrom Spoofing