| Version | Supported |
|---|---|
| latest | ✅ |
| main | ✅ |
| < 2025 | ❌ |
This Docker image includes several security hardening measures:
- Non-root user: Container runs as UID/GID 10000 by default
- Minimal capabilities: Container drops all capabilities except those required
- HTTP Basic Auth: Web interface protected with username/password
- Gateway token: API access requires bearer token authentication
- Nginx reverse proxy: Provides security headers and rate limiting
- No secrets in images: All sensitive data provided via environment variables
If you discover a security vulnerability, please report it by:
- Email: Open a GitHub Security Advisory at https://github.com/xfanth/polyclaw/security/advisories
- Response time: Expect an initial response within 48 hours
- Disclosure: We follow responsible disclosure - please do not publicly disclose until a fix is available
When deploying this image:
- Always set
AUTH_PASSWORDfor production deployments - Use strong
OPENCLAW_GATEWAY_TOKEN(generate withopenssl rand -hex 32) - Keep API keys in
.envfile - never commit them to version control - Use HTTPS in production (deploy behind a reverse proxy with SSL)
- Restrict channel allowlists (WhatsApp, Telegram, Discord) to known contacts
- Regularly update the Docker image for security patches
- Review logs periodically for suspicious activity
- Use Docker secrets or external secret management for sensitive values
- Browser automation: The optional browser sidecar runs Chrome with
--no-sandbox. Only enable in trusted environments. - Bind mounts: Data directories should have restricted permissions (owner-only access recommended)
- Gateway token: If compromised, regenerate immediately and update all connected clients