Peter Steinberger
|
247a06813e
|
fix: avoid gateway cwd for node exec (#58977) (thanks @Starhappysh)
|
2026-04-03 02:04:26 +09:00 |
Peter Steinberger
|
c678ae7e7a
|
feat(exec): default host exec to yolo
|
2026-04-02 14:52:51 +01:00 |
Gustavo Madeira Santana
|
ba735d0158
|
Exec approvals: unify effective policy reporting and actions (#59283)
Merged via squash.
Prepared head SHA: d579b97a93
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
|
2026-04-01 22:02:39 -04:00 |
Vincent Koc
|
2d53ffdec1
|
fix(exec): resolve remote approval regressions (#58792)
* fix(exec): restore remote approval policy defaults
* fix(exec): handle headless cron approval conflicts
* fix(exec): make allow-always durable
* fix(exec): persist exact-command shell trust
* fix(doctor): match host exec fallback
* fix(exec): preserve blocked and inline approval state
* Doctor: surface allow-always ask bypass
* Doctor: match effective exec policy
* Exec: match node durable command text
* Exec: tighten durable approval security
* Exec: restore owner approver fallback
* Config: refresh Slack approval metadata
---------
Co-authored-by: scoootscooob <zhentongfan@gmail.com>
|
2026-04-01 02:07:20 -07:00 |
nanakotsai
|
7f53c1ca00
|
test(exec): cover delayed Discord approval continuation
|
2026-04-01 17:56:55 +09:00 |
nanakotsai
|
63da2c7034
|
fix(exec): resume agent session after approval completion
|
2026-04-01 17:56:55 +09:00 |
scoootscooob
|
dd9d0bdd8e
|
fix(exec): harden shell-side approval guardrails (#57839)
* fix(exec): harden approval handling
* fix(exec): tighten approval guardrails
* fix(exec): reject prefixed approval commands
* fix(exec): isolate shell approval guardrails
* fix(exec): recurse through wrapped approval commands
* fix(exec): restore allowlist wrapper import
* fix(exec): strip env wrappers before approval detection
* fix(exec): inspect nested shell wrapper options
|
2026-03-30 15:49:24 -07:00 |
Josh Avant
|
5e4a64848f
|
fix(exec): harden async approval followup delivery in webchat-only sessions (#57359)
* fix(exec): harden approval followup delivery fallback
* refactor(delivery): share best-effort followup routing helpers
* test(subagents): cover webchat-only completion announce delivery
* docs(exec): clarify async followup delivery behavior
* fix(exec): harden delivery downgrade logging
* test(gateway): cover multi-channel best-effort fallback
* fix(exec): preserve webchat origin on session-only followups
* fix(subagents): keep internal announces channel-less
|
2026-03-29 20:54:13 -05:00 |
Peter Steinberger
|
168ab94eee
|
refactor(config): pin runtime snapshot and drop ttl cache
|
2026-03-29 22:57:31 +01:00 |
Peter Steinberger
|
3ec000b995
|
refactor: align same-chat approval routing
|
2026-03-30 06:52:28 +09:00 |
wangchunyue
|
fc3f6fa51f
|
fix: preserve node exec cwd on remote hosts (#50961) (thanks @openperf)
* fix(gateway): skip local workdir resolution for remote node execution
* chore: add inline comment for non-obvious node workdir skip
* fix: preserve node exec cwd on remote hosts (#50961) (thanks @openperf)
---------
Co-authored-by: Ayaan Zaidi <hi@obviy.us>
|
2026-03-29 17:46:49 +05:30 |
scoootscooob
|
5d81b64343
|
fix(exec): fail closed when sandbox is unavailable and harden deny followups (#56800)
* fix(exec): fail closed when sandbox is unavailable and harden deny followups
* docs(changelog): note exec fail-closed fix
|
2026-03-28 22:20:49 -07:00 |
Peter Steinberger
|
d67efbfbd3
|
test: stabilize test isolation
|
2026-03-23 23:01:22 +00:00 |
Peter Steinberger
|
f9a7427e8e
|
test: refresh thread-safe agent fixtures
|
2026-03-23 10:47:02 -07:00 |
Peter Steinberger
|
3fac0d11fa
|
test: fix base vitest thread regressions
|
2026-03-22 23:37:31 -07:00 |
Peter Steinberger
|
e731974da1
|
refactor: share approval id test helpers
|
2026-03-13 20:19:39 +00:00 |
Peter Steinberger
|
0625547800
|
refactor: share approval unavailable fixtures
|
2026-03-13 20:19:38 +00:00 |
Harold Hunt
|
de49a8b72c
|
Telegram: exec approvals for OpenCode/Codex (#37233)
Merged via squash.
Prepared head SHA: f243379094
Co-authored-by: huntharo <5617868+huntharo@users.noreply.github.com>
Co-authored-by: huntharo <5617868+huntharo@users.noreply.github.com>
Reviewed-by: @huntharo
|
2026-03-09 23:04:35 -04:00 |
Peter Steinberger
|
c6575891c7
|
fix(exec): inherit ask from exec-approvals.json when tools.exec.ask unset
Landed from contributor PR #29187 by @Bartok9.
Co-authored-by: Bartok9 <259807879+Bartok9@users.noreply.github.com>
|
2026-03-08 00:35:50 +00:00 |
Peter Steinberger
|
173132165d
|
fix(exec): honor exec-approvals ask=off for gateway/node runs
Landed from contributor PR #26789 by @pandego.
Co-authored-by: Miguel Miranda Dias <7780875+pandego@users.noreply.github.com>
|
2026-03-08 00:29:34 +00:00 |
Peter Steinberger
|
fd3ca8a34c
|
refactor: dedupe agent and browser cli helpers
|
2026-03-03 00:15:00 +00:00 |
Peter Steinberger
|
155118751f
|
refactor!: remove versioned system-run approval contract
|
2026-03-02 01:12:53 +00:00 |
Peter Steinberger
|
7b2b86c60a
|
fix(exec): add approval race changelog and regressions
|
2026-02-24 03:22:05 +00:00 |
Peter Steinberger
|
6f0dd61795
|
fix(exec): restore two-phase approval registration flow
|
2026-02-24 03:16:36 +00:00 |
Vincent Koc
|
0e28e50b45
|
fix(security): detect obfuscated commands that bypass allowlist filters (#24287)
* security(exec): add obfuscated command detector
* test(exec): cover obfuscation detector patterns
* security(exec): enforce obfuscation approval on gateway host
* security(exec): enforce obfuscation approval on node host
* test(exec): prevent obfuscation timeout bypass
* chore(changelog): credit obfuscation security fix
|
2026-02-23 02:50:06 -05:00 |
Peter Steinberger
|
047e18693e
|
test: reclassify exec approval-id suite as unit test
|
2026-02-22 10:45:23 +00:00 |
Peter Steinberger
|
9131b22a28
|
test: migrate suites to e2e coverage layout
|
2026-02-13 14:28:22 +00:00 |
Peter Steinberger
|
9a7160786a
|
refactor: rename to openclaw
|
2026-01-30 03:16:21 +01:00 |
Peter Steinberger
|
6d16a658e5
|
refactor: rename clawdbot to moltbot with legacy compat
|
2026-01-27 12:21:02 +00:00 |
Peter Steinberger
|
a4f6b3528a
|
fix: cover elevated ask approvals (#1636)
|
2026-01-24 21:12:46 +00:00 |
Peter Steinberger
|
5662a9cdfc
|
fix: honor tools.exec ask/security in approvals
|
2026-01-24 04:53:44 +00:00 |
Peter Steinberger
|
e872f5335b
|
fix: allow chained exec allowlists
Co-authored-by: Lucas Czekaj <1464539+czekaj@users.noreply.github.com>
|
2026-01-23 00:11:58 +00:00 |
Peter Steinberger
|
646ea6ef0b
|
test: use absolute exec path for allowlist
|
2026-01-22 09:20:38 +00:00 |
Peter Steinberger
|
0824bc0236
|
test: isolate exec allowlist env
|
2026-01-22 08:58:55 +00:00 |
Lucas Czekaj
|
4b3e9c0f33
|
fix(exec): align node exec approvals (#1425)
Thanks @czekaj.
Co-authored-by: Lucas Czekaj <lukasz@czekaj.us>
|
2026-01-22 07:22:43 +00:00 |
Peter Steinberger
|
7e1a17e5e6
|
fix: unify exec approval ids
|
2026-01-22 00:59:29 +00:00 |