docs(gateway): clarify trusted operator HTTP endpoints

This commit is contained in:
Peter Steinberger
2026-03-07 18:48:13 +00:00
parent 8bd0eb5424
commit 729ee165ed
2 changed files with 2 additions and 0 deletions

View File

@@ -35,6 +35,7 @@ Treat this endpoint as a **full operator-access** surface for the gateway instan
- HTTP bearer auth here is not a narrow per-user scope model.
- A valid Gateway token/password for this endpoint should be treated like an owner/operator credential.
- Requests run through the same control-plane agent path as trusted operator actions.
- There is no separate non-owner/per-user tool boundary on this endpoint; once a caller passes Gateway auth here, OpenClaw treats that caller as a trusted operator for this gateway.
- If the target agent policy allows sensitive tools, this endpoint can use them.
- Keep this endpoint on loopback/tailnet/private ingress only; do not expose it directly to the public internet.

View File

@@ -37,6 +37,7 @@ Treat this endpoint as a **full operator-access** surface for the gateway instan
- HTTP bearer auth here is not a narrow per-user scope model.
- A valid Gateway token/password for this endpoint should be treated like an owner/operator credential.
- Requests run through the same control-plane agent path as trusted operator actions.
- There is no separate non-owner/per-user tool boundary on this endpoint; once a caller passes Gateway auth here, OpenClaw treats that caller as a trusted operator for this gateway.
- If the target agent policy allows sensitive tools, this endpoint can use them.
- Keep this endpoint on loopback/tailnet/private ingress only; do not expose it directly to the public internet.