mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-18 22:59:38 +02:00
* feat(file-transfer): add bundled plugin for binary file ops on nodes
New extensions/file-transfer/ plugin exposing four agent tools
(file_fetch, dir_list, dir_fetch, file_write) and four matching
node-host commands (file.fetch, dir.list, dir.fetch, file.write).
Lets agents read and write files on paired nodes by absolute path,
bypassing the bash output cap (200KB) and the live tool-result
text cap that would otherwise truncate base64 payloads.
Public surface
--------------
- file_fetch({ node, path, maxBytes? })
Image MIMEs return image content blocks; small text (<=8 KB) inlines
as text content; everything else returns a saved-media-path text
block. sha256-verified end-to-end.
- dir_list({ node, path, pageToken?, maxEntries? })
Structured directory listing — name, path, size, mimeType, isDir,
mtime. Paginated. No content transfer.
- dir_fetch({ node, path, maxBytes?, includeDotfiles? })
Server-side tar -czf streamed back, unpacked into the gateway media
store, returns a manifest of saved paths. Single round-trip.
60s wall-clock timeouts on tar create/unpack. tar -xzf without -P
rejects absolute paths in archive entries.
- file_write({ node, path, contentBase64, mimeType?, overwrite?,
createParents? })
Atomic write (temp + rename). Refuses to overwrite by default.
Refuses to write through symlinks (lstat check). Buffer-side
sha256 (no read-back race). Pair with file_fetch to round-trip
files between nodes — DO NOT use exec/cp for file copies.
All four commands gated by:
- dangerous-by-default node command policy
(gateway.nodes.allowCommands opt-in)
- per-node path policy (gateway.nodes.fileTransfer)
- optional operator approval prompt (ask: off | on-miss | always)
16 MB raw byte ceiling per single-frame round-trip (25 MB WS frame
with ~33% base64 overhead and JSON envelope). 8 MB defaults.
Path policy and approvals
-------------------------
Default behavior is DENY. The operator must explicitly opt in:
{
"gateway": {
"nodes": {
"fileTransfer": {
"<nodeId-or-displayName>": {
"ask": "off" | "on-miss" | "always",
"allowReadPaths": ["~/Screenshots/**", "/tmp/**"],
"allowWritePaths": ["~/Downloads/**"],
"denyPaths": ["**/.ssh/**", "**/.aws/**"],
"maxBytes": 16777216
},
"*": { "ask": "on-miss" }
}
}
}
}
ask modes:
off — silent: allow if matched, deny if not (default)
on-miss — silent allow if matched; prompt on miss
always — prompt every call (denyPaths still hard-deny)
denyPaths always wins. allow-always from the prompt persists the
exact path back into allowReadPaths/allowWritePaths via
mutateConfigFile so subsequent matching calls go silent.
Reuses existing primitives — no new gateway methods:
plugin.approval.request / plugin.approval.waitDecision
decision: allow-once | allow-always | deny
Pre-flight against requested path AND post-flight against the
canonicalPath returned by the node — closes symlink-escape attacks
where the requested path matched policy but realpath resolves
somewhere else.
Audit log
---------
JSONL at ~/.openclaw/audit/file-transfer.jsonl. Records every
decision (allow/allowed-once/allowed-always/denied/error) with
timestamp, op, nodeId, displayName, requestedPath, canonicalPath,
decision, error code, sizeBytes, sha256, durationMs. Best-effort
writes; never propagates failure.
Plugin layout
-------------
extensions/file-transfer/
index.ts definePluginEntry, nodeHostCommands
openclaw.plugin.json contracts.tools registration
package.json
src/node-host/{file-fetch,dir-list,dir-fetch,file-write}.ts
src/tools/{file-fetch,dir-list,dir-fetch,file-write}-tool.ts
src/shared/
mime.ts single-source extension->MIME map + image/text sets
errors.ts shared error code enum and helpers
params.ts shared param-validation helpers + GatewayCallOptions
policy.ts evaluateFilePolicy, persistAllowAlways
approval.ts plugin.approval.request wrapper
gatekeep.ts one-stop policy + approval + audit orchestrator
audit.ts JSONL audit sink
Core touch points
-----------------
- src/infra/node-commands.ts: NODE_FILE_FETCH_COMMAND,
NODE_DIR_LIST_COMMAND, NODE_DIR_FETCH_COMMAND,
NODE_FILE_WRITE_COMMAND, NODE_FILE_COMMANDS array
- src/gateway/node-command-policy.ts: all four added to
DEFAULT_DANGEROUS_NODE_COMMANDS
- src/security/audit-extra.sync.ts: audit detail mentions file ops
- src/agents/tools/nodes-tool-media.ts: MEDIA_INVOKE_ACTIONS entry
for file.fetch redirects raw nodes(action=invoke) callers to the
dedicated file_fetch tool to prevent base64 context bloat
- src/agents/tools/nodes-tool.ts: nodes tool description points to
the dedicated file_fetch tool
Known limitations / follow-ups
------------------------------
- No tests in this PR. For a security-sensitive surface this is a
gap; will follow up with a test pass.
- Direct CLI invocation (openclaw nodes invoke --command file.fetch)
bypasses the plugin policy entirely. Plugin-side gating is the
realistic threat model (agent on iMessage requesting paths it
shouldn't), but for true defense-in-depth, policy belongs in the
gateway-side node.invoke dispatch. Move-policy-to-core is a
separate PR.
- file_watch (long-lived filesystem event subscription) is not
included; it needs a new node-protocol primitive for streaming
event channels and was descoped from this PR.
- dir_fetch includeDotfiles: true is the only supported mode;
BSD tar exclude patterns reliably collapse dotfile filtering
to an empty archive. Reliable filtering needs a
`find ! -name ".*" | tar -T -` pipeline; deferred.
- dir_fetch du -sk preflight is a heuristic (du * 4 vs maxBytes);
the mid-stream byte cap is the actual safety net.
* test(file-transfer): add unit tests for handlers, policy, and shared utilities
Adds 77 tests covering:
- handleFileFetch: validation, fs errors, sha256, size cap, symlink canonicalization
- handleFileWrite: validation, atomic write, overwrite policy, parent dir handling, symlink refusal, integrity check, size cap
- handleDirList: validation, fs errors, sorted listing, dotfile inclusion, pagination
- handleDirFetch: validation, fs errors, gzipped tar with sha256, mid-stream byte cap
- evaluateFilePolicy: default-deny, denyPaths-wins, allow matching, ask modes (off/on-miss/always), node-id/displayName/'*' resolution
- persistAllowAlways: append, dedupe, create-on-missing
- shared/mime: extension lookup, image/text inline sets
- shared/errors: err helper, classifyFsError, throwFromNodePayload
Also fixes accumulated lint regressions in the prod source flagged once these
files moved into the changed-gate scope (parseInt -> Number.parseInt, redundant
type casts removed, single-statement if bodies wrapped in braces).
* fix(file-transfer): address PR review feedback (security + availability)
Reviewer findings addressed (greptile + aisle):
- policy: persistAllowAlways no longer escalates per-node approvals to the
'*' wildcard entry; allow-always now writes under the specific node's
own entry, never the wildcard (greptile P1 SECURITY).
- policy: add literal '..' segment short-circuit in evaluateFilePolicy,
raised before glob match. Stops "/allowed/../etc/passwd" from passing
preflight against "/allowed/**" globs (aisle MEDIUM CWE-22).
- file-write: replace no-op base64 try/catch with actual round-trip
validation. Buffer.from(s, "base64") never throws — invalid input
silently decoded to garbage bytes. Now re-encodes and compares
modulo padding/url-variant chars (greptile P1 SECURITY).
- file-write: document the parent-symlink residual risk and rely on the
existing gateway-side post-flight policy check; full rollback requires
a node-side file.unlink which is deferred to a follow-up. Initial
segment-walk attempt was reverted because it false-positives on system
symlinks like macOS /var → /private/var (aisle HIGH CWE-59).
- dir-fetch tool: add preValidateTarball pass that runs `tar -tzvf` and
rejects symlinks, hardlinks, absolute paths, '..' traversal,
uncompressed sizes >64MB, and entry counts >5000 — before any
extraction. Drops --no-overwrite-dir (GNU-only flag rejected by BSD
tar on macOS) (aisle HIGH x2 CWE-22 + CWE-409, greptile P2).
- dir-fetch tool: stream-hash files via fs.open + read loop instead of
fs.readFile to avoid full-buffer reads on large extracted entries.
- dir-fetch handler: replace spawnSync in countTarEntries with async
spawn + bounded buffer so tar -tzf can't park the node-host event
loop for up to 10s on a slow filesystem (greptile P1 AVAIL).
- audit: clear auditDirPromise on rejection so a transient mkdir
failure doesn't permanently silence the audit log (greptile P2).
New tests: wildcard escalation rejection, base64 malformed/url-variant,
'..' traversal short-circuit (3 cases). 84/84 passing.
* fix(file-transfer): CI failures + second-round PR review feedback
CI failures on previous push:
- Declare runtime deps (minimatch, typebox) in package.json — failed the
extension-runtime-dependencies contract test that scans imports.
- Switch policy.ts and policy.test.ts off the broad
openclaw/plugin-sdk/config-runtime barrel and onto the narrow
openclaw/plugin-sdk/config-mutation + runtime-config-snapshot subpaths.
This satisfies the deprecated-internal-config-api architecture guard.
Second-round Aisle findings:
- policy: traversal-segment check now treats backslash and forward slash
as equivalent, so a Windows node can't be hit with mixed-separator
"C:\\allowed\\..\\Windows\\system.ini" (Aisle HIGH CWE-22).
- dir-fetch tool: replace the single fragile `tar -tvzf` parser pass
(which broke for filenames containing whitespace) with two robust
passes: `tar -tzf` for paths only (one per line, no parsing of
fixed columns) and `tar -tzvf` for type chars only (FIRST CHAR of each
line, never the path column). Also reject backslash-containing entry
names. Drops the in-process uncompressed-size cap because reliably
parsing sizes from tar output is fragile and Aisle flagged it as a
bypass primitive — entry-count cap stays (Aisle HIGH CWE-22, MED).
Tests still 84/84 passing.
* fix(file-transfer): third-round PR review feedback
Aisle's re-analysis on b63daa6a05 surfaced 3 actionable findings:
- nodes.invoke bypass (HIGH CWE-285): generic nodes.action="invoke" let
agents call dir.list/dir.fetch/file.write directly, skipping the
file-transfer plugin's gatekeep + policy + approval flow. Only file.fetch
was redirected to its dedicated tool. Add the other three to
MEDIA_INVOKE_ACTIONS so the redirect-or-deny logic in
nodes-tool-commands fires for all four. The dedicated tools enforce
policy; the generic invoke surface no longer has a way to skip them
without an explicit allowMediaInvokeCommands opt-in.
- prototype pollution in persistAllowAlways (MED CWE-1321): a paired
node with displayName "__proto__" / "prototype" / "constructor" would
mutate the fileTransfer object's prototype when persisting allow-always.
Reject those keys explicitly. Switch the existing-key lookup to
Object.prototype.hasOwnProperty.call so a key like "constructor"
doesn't accidentally match Object.prototype.constructor.
- decompression-bomb cap in dir_fetch (MED CWE-409): compressed tar is
bounded upstream, but a highly compressible bomb can still expand to
gigabytes. Enforce DIR_FETCH_MAX_UNCOMPRESSED_BYTES (64MB) summed
across extracted files and DIR_FETCH_MAX_SINGLE_FILE_BYTES (16MB) per
entry, both checked during the post-extract walk. On bust, rm -rf the
rootDir and audit-log + throw UNCOMPRESSED_TOO_LARGE.
Tests: 85/85 passing (added prototype-pollution rejection test).
Aisle's HIGH parent-symlink finding remains documented as deferred — full
rollback requires a node-side file.unlink command which is out of scope
for this PR. The gateway-side post-flight policy check still detects and
loudly errors on canonical-path mismatches.
* fix(file-transfer): refuse symlink traversal by default with followSymlinks opt-in
Closes the deferred Aisle HIGH parent-symlink finding. Instead of
detecting the escape in a post-flight gateway check after the file is
already written, the node-side handler now refuses pre-flight if any
component of the requested path resolves through a symlink.
Behavior:
- Reads (file.fetch / dir.list / dir.fetch): node realpath()s the
requested path. If canonical != requested AND followSymlinks=false,
return SYMLINK_REDIRECT { canonicalPath } — no I/O happens.
- Writes (file.write): node realpath()s the parent dir. Same refusal
rule. The lstat-on-final check is kept to catch the case where the
target file itself is an existing symlink.
- Opt-in: set gateway.nodes.fileTransfer.<node>.followSymlinks=true to
bring back the previous "follow + post-flight check" behavior.
Operator UX: the SYMLINK_REDIRECT response includes the canonical path
so the operator can either update their allow list to the canonical form
or set followSymlinks=true on that node. On macOS, /var → /private/var
and /tmp → /private/tmp are system aliases that trip the new check, so
operators using those paths need followSymlinks=true OR canonical-path
allowlists.
Wiring:
- Add followSymlinks?: boolean to NodeFilePolicyConfig.
- evaluateFilePolicy returns followSymlinks (default false) on its
ok=true branches.
- gatekeep propagates it via GatekeepOutcome.
- Each tool passes it as a node.invoke param.
- Each handler honors it pre-flight before any read/write.
Tests updated: 89/89 passing.
- realpath(mkdtemp()) so existing happy-path tests don't trip the new
default on macOS where mkdtemp lands under symlinked /var/folders.
- New tests: SYMLINK_REDIRECT refusal for file.fetch and file.write
parent traversal; opt-in passthrough when followSymlinks=true.
- New policy test: followSymlinks propagation default false / true.
* fix(file-transfer): close two more aisle findings on 069bd66
Aisle re-analysis on 069bd66 surfaced two issues my earlier round-three
fix missed:
- HIGH (CWE-284): file.fetch / dir.fetch / dir.list / file.write were
still bypassable via the generic nodes.action="invoke" surface when
the operator had set allowMediaInvokeCommands=true. That flag was
meant to opt in to base64-bloat for camera/screen, not to disable
path policy on file-transfer. Split the redirect map: introduce
POLICY_REDIRECT_INVOKE_COMMANDS (file-transfer only) which ALWAYS
rerouts to its dedicated tool regardless of the bloat flag. Camera
and screen continue to use the bloat-only redirect (suppressed by
allowMediaInvokeCommands=true). Confirmed by clawsweeper P1.
- MED (CWE-276): tar -xzf in dir_fetch unpack preserved archive
ownership and permissions, so a malicious node could plant
setuid/setgid or world-writable files on a gateway running with
elevated privileges. Add --no-same-owner --no-same-permissions
(both flags are portable across BSD tar / GNU tar).
Tests: 89/89 passing.
* chore(file-transfer): drop file_watch from plugin description
Phase 5 (file_watch) was deferred earlier in this PR. Strip the watch
mention from the plugin description in package.json,
openclaw.plugin.json, and index.ts so the metadata reflects what's
actually shipped (file_fetch, dir_list, dir_fetch, file_write).
Closes clawsweeper P3.
* fix(file-transfer): hash before rename and allow zero-byte round-trip
Two of Peter's review findings on PR #74134:
- P2 (file-write integrity): hash the decoded buffer + compare against
expectedSha256 BEFORE temp+rename. Previously the rename happened
first, then the sha check unlinked the target on mismatch — with
overwrite=true a bad caller hash could replace + delete the original.
Now a hash mismatch returns INTEGRITY_FAILURE without touching disk.
Added a regression test that asserts the original file survives.
- P2/P3 (zero-byte round-trip): the tool layer's truthy checks on
contentBase64 and base64 rejected the empty string, blocking zero-byte
files from round-tripping through file_fetch -> file_write. Switched
to type-checks (typeof === "string") and added zero-byte tests at the
handler layer for both fetch and write (sha matches the known empty
digest).
Tests: 92/92 passing.
* fix(file-transfer): declare gateway.nodes.fileTransfer in core config schema
Peter's P1/P2 finding: the plugin reads/writes gateway.nodes.fileTransfer
via casts through unknown because the strict zod schema and OpenClawConfig
type didn't declare it. That meant `openclaw config validate` would
reject the very examples in the plugin's own documentation.
- Add fileTransfer block to gateway.nodes in src/config/zod-schema.ts
with the full per-node entry shape (ask, allowReadPaths,
allowWritePaths, denyPaths, maxBytes, followSymlinks).
- Add GatewayNodeFileTransferEntry + the fileTransfer field on
GatewayNodesConfig in src/config/types.gateway.ts.
- Drop the `as unknown` casts in the extension's policy.ts now that
gateway.nodes.fileTransfer is properly typed end-to-end.
- Regenerate docs/.generated/config-baseline.sha256.
Tests: 92/92 passing. pnpm config:docs:check OK.
* fix(file-transfer): enforce path policy at gateway dispatch
Closes Peter's P1 review finding on PR #74134.
The agent-tool-only redirect added in earlier commits left CLI
(`openclaw nodes invoke`), plugin-runtime, and raw `node.invoke` callers
able to skip the file-transfer path policy entirely. The fix moves the
security boundary down to the gateway: every code path that reaches
`node.invoke` for file.fetch / dir.list / dir.fetch / file.write now
runs the same allow/deny check.
- New: src/gateway/file-transfer-dispatch.ts with
`evaluateFileTransferDispatchPolicy` and `isFileTransferCommand`. Same
semantics as the extension-side `evaluateFilePolicy` minus the
operator-prompt flow (prompts stay at the agent-tool layer; the
gateway is silent enforcement).
- src/gateway/server-methods/nodes.ts: after the existing command
allowlist check, run the new gate before forwarding. Denies emit
INVALID_REQUEST with a structured `{ command, code, reason }`.
- Decision matrix mirrors the extension: NO_POLICY (no entry for
this node) deny, denyPaths-wins, '..' traversal short-circuit
(with backslash separator handling), allowPaths match → allow,
no allow match → deny.
- 19 new unit tests covering each branch including identity
resolution (nodeId/displayName/'*'), prototype-pollution-safe lookup,
and read-vs-write allow-list separation.
Note on allow-once approvals: the agent tool's interactive
`allow-once` decision now has to flow through the dedicated tool's
pre-flight (which forwards an approved request); raw `nodes.invoke`
callers cannot benefit from one-time approvals because the gateway is
silent. allow-always (which persists to allowReadPaths/allowWritePaths)
continues to work transparently because by the time the next request
hits the gateway the path is in the persisted allow list.
Tests: 92 extension + 19 gateway = 111 total, all passing.
* fix(file-transfer): enforce node policy in gateway
* fix(file-transfer): use plugin node policy only
* fix(file-transfer): harden node policy edge cases
* fix(file-transfer): close review hardening gaps
* fix(file-transfer): harden node invoke policy
* fix(file-transfer): align runtime dependency versions
* fix(file-transfer): keep minimatch extension-owned
* refactor(file-transfer): remove unused approval gate
* fix(file-transfer): require canonical node policy authorization
Co-authored-by: Omar Shahine <10343873+omarshahine@users.noreply.github.com>
* fix(clawsweeper): address review for automerge-openclaw-openclaw-74134 (1)
Co-authored-by: Omar Shahine <10343873+omarshahine@users.noreply.github.com>
* fix(file-transfer): recheck dir fetch archive policy after fetch
* fix(file-transfer): name file-transfer tool in invoke redirect
---------
Co-authored-by: Omar Shahine <10343873+omarshahine@users.noreply.github.com>
Co-authored-by: Peter Steinberger <steipete@gmail.com>
Co-authored-by: clawsweeper-repair <clawsweeper-repair@users.noreply.github.com>
437 lines
17 KiB
Markdown
437 lines
17 KiB
Markdown
---
|
||
summary: "Nodes: pairing, capabilities, permissions, and CLI helpers for canvas/camera/screen/device/notifications/system"
|
||
read_when:
|
||
- Pairing iOS/Android nodes to a gateway
|
||
- Using node canvas/camera for agent context
|
||
- Adding new node commands or CLI helpers
|
||
title: "Nodes"
|
||
---
|
||
|
||
A **node** is a companion device (macOS/iOS/Android/headless) that connects to the Gateway **WebSocket** (same port as operators) with `role: "node"` and exposes a command surface (e.g. `canvas.*`, `camera.*`, `device.*`, `notifications.*`, `system.*`) via `node.invoke`. Protocol details: [Gateway protocol](/gateway/protocol).
|
||
|
||
Legacy transport: [Bridge protocol](/gateway/bridge-protocol) (TCP JSONL;
|
||
historical only for current nodes).
|
||
|
||
macOS can also run in **node mode**: the menubar app connects to the Gateway’s
|
||
WS server and exposes its local canvas/camera commands as a node (so
|
||
`openclaw nodes …` works against this Mac). In remote gateway mode, browser
|
||
automation is handled by the CLI node host (`openclaw node run` or the
|
||
installed node service), not by the native app node.
|
||
|
||
Notes:
|
||
|
||
- Nodes are **peripherals**, not gateways. They don’t run the gateway service.
|
||
- Telegram/WhatsApp/etc. messages land on the **gateway**, not on nodes.
|
||
- Troubleshooting runbook: [/nodes/troubleshooting](/nodes/troubleshooting)
|
||
|
||
## Pairing + status
|
||
|
||
**WS nodes use device pairing.** Nodes present a device identity during `connect`; the Gateway
|
||
creates a device pairing request for `role: node`. Approve via the devices CLI (or UI).
|
||
|
||
Quick CLI:
|
||
|
||
```bash
|
||
openclaw devices list
|
||
openclaw devices approve <requestId>
|
||
openclaw devices reject <requestId>
|
||
openclaw nodes status
|
||
openclaw nodes describe --node <idOrNameOrIp>
|
||
```
|
||
|
||
If a node retries with changed auth details (role/scopes/public key), the prior
|
||
pending request is superseded and a new `requestId` is created. Re-run
|
||
`openclaw devices list` before approving.
|
||
|
||
Notes:
|
||
|
||
- `nodes status` marks a node as **paired** when its device pairing role includes `node`.
|
||
- The device pairing record is the durable approved-role contract. Token
|
||
rotation stays inside that contract; it cannot upgrade a paired node into a
|
||
different role that pairing approval never granted.
|
||
- `node.pair.*` (CLI: `openclaw nodes pending/approve/reject/remove/rename`) is a separate gateway-owned
|
||
node pairing store; it does **not** gate the WS `connect` handshake.
|
||
- `openclaw nodes remove --node <id|name|ip>` deletes stale entries from that
|
||
separate gateway-owned node pairing store.
|
||
- Approval scope follows the pending request's declared commands:
|
||
- commandless request: `operator.pairing`
|
||
- non-exec node commands: `operator.pairing` + `operator.write`
|
||
- `system.run` / `system.run.prepare` / `system.which`: `operator.pairing` + `operator.admin`
|
||
|
||
## Remote node host (system.run)
|
||
|
||
Use a **node host** when your Gateway runs on one machine and you want commands
|
||
to execute on another. The model still talks to the **gateway**; the gateway
|
||
forwards `exec` calls to the **node host** when `host=node` is selected.
|
||
|
||
### What runs where
|
||
|
||
- **Gateway host**: receives messages, runs the model, routes tool calls.
|
||
- **Node host**: executes `system.run`/`system.which` on the node machine.
|
||
- **Approvals**: enforced on the node host via `~/.openclaw/exec-approvals.json`.
|
||
|
||
Approval note:
|
||
|
||
- Approval-backed node runs bind exact request context.
|
||
- For direct shell/runtime file executions, OpenClaw also best-effort binds one concrete local
|
||
file operand and denies the run if that file changes before execution.
|
||
- If OpenClaw cannot identify exactly one concrete local file for an interpreter/runtime command,
|
||
approval-backed execution is denied instead of pretending full runtime coverage. Use sandboxing,
|
||
separate hosts, or an explicit trusted allowlist/full workflow for broader interpreter semantics.
|
||
|
||
### Start a node host (foreground)
|
||
|
||
On the node machine:
|
||
|
||
```bash
|
||
openclaw node run --host <gateway-host> --port 18789 --display-name "Build Node"
|
||
```
|
||
|
||
### Remote gateway via SSH tunnel (loopback bind)
|
||
|
||
If the Gateway binds to loopback (`gateway.bind=loopback`, default in local mode),
|
||
remote node hosts cannot connect directly. Create an SSH tunnel and point the
|
||
node host at the local end of the tunnel.
|
||
|
||
Example (node host -> gateway host):
|
||
|
||
```bash
|
||
# Terminal A (keep running): forward local 18790 -> gateway 127.0.0.1:18789
|
||
ssh -N -L 18790:127.0.0.1:18789 user@gateway-host
|
||
|
||
# Terminal B: export the gateway token and connect through the tunnel
|
||
export OPENCLAW_GATEWAY_TOKEN="<gateway-token>"
|
||
openclaw node run --host 127.0.0.1 --port 18790 --display-name "Build Node"
|
||
```
|
||
|
||
Notes:
|
||
|
||
- `openclaw node run` supports token or password auth.
|
||
- Env vars are preferred: `OPENCLAW_GATEWAY_TOKEN` / `OPENCLAW_GATEWAY_PASSWORD`.
|
||
- Config fallback is `gateway.auth.token` / `gateway.auth.password`.
|
||
- In local mode, node host intentionally ignores `gateway.remote.token` / `gateway.remote.password`.
|
||
- In remote mode, `gateway.remote.token` / `gateway.remote.password` are eligible per remote precedence rules.
|
||
- If active local `gateway.auth.*` SecretRefs are configured but unresolved, node-host auth fails closed.
|
||
- Node-host auth resolution only honors `OPENCLAW_GATEWAY_*` env vars.
|
||
|
||
### Start a node host (service)
|
||
|
||
```bash
|
||
openclaw node install --host <gateway-host> --port 18789 --display-name "Build Node"
|
||
openclaw node start
|
||
openclaw node restart
|
||
```
|
||
|
||
### Pair + name
|
||
|
||
On the gateway host:
|
||
|
||
```bash
|
||
openclaw devices list
|
||
openclaw devices approve <requestId>
|
||
openclaw nodes status
|
||
```
|
||
|
||
If the node retries with changed auth details, re-run `openclaw devices list`
|
||
and approve the current `requestId`.
|
||
|
||
Naming options:
|
||
|
||
- `--display-name` on `openclaw node run` / `openclaw node install` (persists in `~/.openclaw/node.json` on the node).
|
||
- `openclaw nodes rename --node <id|name|ip> --name "Build Node"` (gateway override).
|
||
|
||
### Allowlist the commands
|
||
|
||
Exec approvals are **per node host**. Add allowlist entries from the gateway:
|
||
|
||
```bash
|
||
openclaw approvals allowlist add --node <id|name|ip> "/usr/bin/uname"
|
||
openclaw approvals allowlist add --node <id|name|ip> "/usr/bin/sw_vers"
|
||
```
|
||
|
||
Approvals live on the node host at `~/.openclaw/exec-approvals.json`.
|
||
|
||
### Point exec at the node
|
||
|
||
Configure defaults (gateway config):
|
||
|
||
```bash
|
||
openclaw config set tools.exec.host node
|
||
openclaw config set tools.exec.security allowlist
|
||
openclaw config set tools.exec.node "<id-or-name>"
|
||
```
|
||
|
||
Or per session:
|
||
|
||
```
|
||
/exec host=node security=allowlist node=<id-or-name>
|
||
```
|
||
|
||
Once set, any `exec` call with `host=node` runs on the node host (subject to the
|
||
node allowlist/approvals).
|
||
|
||
`host=auto` will not implicitly choose the node on its own, but an explicit per-call `host=node` request is allowed from `auto`. If you want node exec to be the default for the session, set `tools.exec.host=node` or `/exec host=node ...` explicitly.
|
||
|
||
Related:
|
||
|
||
- [Node host CLI](/cli/node)
|
||
- [Exec tool](/tools/exec)
|
||
- [Exec approvals](/tools/exec-approvals)
|
||
|
||
## Invoking commands
|
||
|
||
Low-level (raw RPC):
|
||
|
||
```bash
|
||
openclaw nodes invoke --node <idOrNameOrIp> --command canvas.eval --params '{"javaScript":"location.href"}'
|
||
```
|
||
|
||
Higher-level helpers exist for the common “give the agent a MEDIA attachment” workflows.
|
||
|
||
## Command policy
|
||
|
||
Node commands must pass two gates before they can be invoked:
|
||
|
||
1. The node must declare the command in its WebSocket `connect.commands` list.
|
||
2. The gateway's platform policy must allow the declared command.
|
||
|
||
Windows and macOS companion nodes allow safe declared commands such as
|
||
`canvas.*`, `camera.list`, `location.get`, and `screen.snapshot` by default.
|
||
Dangerous or privacy-heavy commands such as `camera.snap`, `camera.clip`, and
|
||
`screen.record` still require explicit opt-in with
|
||
`gateway.nodes.allowCommands`. `gateway.nodes.denyCommands` always wins over
|
||
defaults and extra allowlist entries.
|
||
|
||
Plugin-owned node commands can add a Gateway node-invoke policy. That policy
|
||
runs after the allowlist check and before forwarding to the node, so raw
|
||
`node.invoke`, CLI helpers, and dedicated agent tools share the same plugin
|
||
permission boundary. Dangerous plugin node commands still require explicit
|
||
`gateway.nodes.allowCommands` opt-in.
|
||
|
||
After a node changes its declared command list, reject the old device pairing
|
||
and approve the new request so the gateway stores the updated command snapshot.
|
||
|
||
## Screenshots (canvas snapshots)
|
||
|
||
If the node is showing the Canvas (WebView), `canvas.snapshot` returns `{ format, base64 }`.
|
||
|
||
CLI helper (writes to a temp file and prints `MEDIA:<path>`):
|
||
|
||
```bash
|
||
openclaw nodes canvas snapshot --node <idOrNameOrIp> --format png
|
||
openclaw nodes canvas snapshot --node <idOrNameOrIp> --format jpg --max-width 1200 --quality 0.9
|
||
```
|
||
|
||
### Canvas controls
|
||
|
||
```bash
|
||
openclaw nodes canvas present --node <idOrNameOrIp> --target https://example.com
|
||
openclaw nodes canvas hide --node <idOrNameOrIp>
|
||
openclaw nodes canvas navigate https://example.com --node <idOrNameOrIp>
|
||
openclaw nodes canvas eval --node <idOrNameOrIp> --js "document.title"
|
||
```
|
||
|
||
Notes:
|
||
|
||
- `canvas present` accepts URLs or local file paths (`--target`), plus optional `--x/--y/--width/--height` for positioning.
|
||
- `canvas eval` accepts inline JS (`--js`) or a positional arg.
|
||
|
||
### A2UI (Canvas)
|
||
|
||
```bash
|
||
openclaw nodes canvas a2ui push --node <idOrNameOrIp> --text "Hello"
|
||
openclaw nodes canvas a2ui push --node <idOrNameOrIp> --jsonl ./payload.jsonl
|
||
openclaw nodes canvas a2ui reset --node <idOrNameOrIp>
|
||
```
|
||
|
||
Notes:
|
||
|
||
- Only A2UI v0.8 JSONL is supported (v0.9/createSurface is rejected).
|
||
|
||
## Photos + videos (node camera)
|
||
|
||
Photos (`jpg`):
|
||
|
||
```bash
|
||
openclaw nodes camera list --node <idOrNameOrIp>
|
||
openclaw nodes camera snap --node <idOrNameOrIp> # default: both facings (2 MEDIA lines)
|
||
openclaw nodes camera snap --node <idOrNameOrIp> --facing front
|
||
```
|
||
|
||
Video clips (`mp4`):
|
||
|
||
```bash
|
||
openclaw nodes camera clip --node <idOrNameOrIp> --duration 10s
|
||
openclaw nodes camera clip --node <idOrNameOrIp> --duration 3000 --no-audio
|
||
```
|
||
|
||
Notes:
|
||
|
||
- The node must be **foregrounded** for `canvas.*` and `camera.*` (background calls return `NODE_BACKGROUND_UNAVAILABLE`).
|
||
- Clip duration is clamped (currently `<= 60s`) to avoid oversized base64 payloads.
|
||
- Android will prompt for `CAMERA`/`RECORD_AUDIO` permissions when possible; denied permissions fail with `*_PERMISSION_REQUIRED`.
|
||
|
||
## Screen recordings (nodes)
|
||
|
||
Supported nodes expose `screen.record` (mp4). Example:
|
||
|
||
```bash
|
||
openclaw nodes screen record --node <idOrNameOrIp> --duration 10s --fps 10
|
||
openclaw nodes screen record --node <idOrNameOrIp> --duration 10s --fps 10 --no-audio
|
||
```
|
||
|
||
Notes:
|
||
|
||
- `screen.record` availability depends on node platform.
|
||
- Screen recordings are clamped to `<= 60s`.
|
||
- `--no-audio` disables microphone capture on supported platforms.
|
||
- Use `--screen <index>` to select a display when multiple screens are available.
|
||
|
||
## Location (nodes)
|
||
|
||
Nodes expose `location.get` when Location is enabled in settings.
|
||
|
||
CLI helper:
|
||
|
||
```bash
|
||
openclaw nodes location get --node <idOrNameOrIp>
|
||
openclaw nodes location get --node <idOrNameOrIp> --accuracy precise --max-age 15000 --location-timeout 10000
|
||
```
|
||
|
||
Notes:
|
||
|
||
- Location is **off by default**.
|
||
- “Always” requires system permission; background fetch is best-effort.
|
||
- The response includes lat/lon, accuracy (meters), and timestamp.
|
||
|
||
## SMS (Android nodes)
|
||
|
||
Android nodes can expose `sms.send` when the user grants **SMS** permission and the device supports telephony.
|
||
|
||
Low-level invoke:
|
||
|
||
```bash
|
||
openclaw nodes invoke --node <idOrNameOrIp> --command sms.send --params '{"to":"+15555550123","message":"Hello from OpenClaw"}'
|
||
```
|
||
|
||
Notes:
|
||
|
||
- The permission prompt must be accepted on the Android device before the capability is advertised.
|
||
- Wi-Fi-only devices without telephony will not advertise `sms.send`.
|
||
|
||
## Android device + personal data commands
|
||
|
||
Android nodes can advertise additional command families when the corresponding capabilities are enabled.
|
||
|
||
Available families:
|
||
|
||
- `device.status`, `device.info`, `device.permissions`, `device.health`
|
||
- `notifications.list`, `notifications.actions`
|
||
- `photos.latest`
|
||
- `contacts.search`, `contacts.add`
|
||
- `calendar.events`, `calendar.add`
|
||
- `callLog.search`
|
||
- `sms.search`
|
||
- `motion.activity`, `motion.pedometer`
|
||
|
||
Example invokes:
|
||
|
||
```bash
|
||
openclaw nodes invoke --node <idOrNameOrIp> --command device.status --params '{}'
|
||
openclaw nodes invoke --node <idOrNameOrIp> --command notifications.list --params '{}'
|
||
openclaw nodes invoke --node <idOrNameOrIp> --command photos.latest --params '{"limit":1}'
|
||
```
|
||
|
||
Notes:
|
||
|
||
- Motion commands are capability-gated by available sensors.
|
||
|
||
## System commands (node host / mac node)
|
||
|
||
The macOS node exposes `system.run`, `system.notify`, and `system.execApprovals.get/set`.
|
||
The headless node host exposes `system.run`, `system.which`, and `system.execApprovals.get/set`.
|
||
|
||
Examples:
|
||
|
||
```bash
|
||
openclaw nodes notify --node <idOrNameOrIp> --title "Ping" --body "Gateway ready"
|
||
openclaw nodes invoke --node <idOrNameOrIp> --command system.which --params '{"name":"git"}'
|
||
```
|
||
|
||
Notes:
|
||
|
||
- `system.run` returns stdout/stderr/exit code in the payload.
|
||
- Shell execution now goes through the `exec` tool with `host=node`; `nodes` remains the direct-RPC surface for explicit node commands.
|
||
- `nodes invoke` does not expose `system.run` or `system.run.prepare`; those stay on the exec path only.
|
||
- The exec path prepares a canonical `systemRunPlan` before approval. Once an
|
||
approval is granted, the gateway forwards that stored plan, not any later
|
||
caller-edited command/cwd/session fields.
|
||
- `system.notify` respects notification permission state on the macOS app.
|
||
- Unrecognized node `platform` / `deviceFamily` metadata uses a conservative default allowlist that excludes `system.run` and `system.which`. If you intentionally need those commands for an unknown platform, add them explicitly via `gateway.nodes.allowCommands`.
|
||
- `system.run` supports `--cwd`, `--env KEY=VAL`, `--command-timeout`, and `--needs-screen-recording`.
|
||
- For shell wrappers (`bash|sh|zsh ... -c/-lc`), request-scoped `--env` values are reduced to an explicit allowlist (`TERM`, `LANG`, `LC_*`, `COLORTERM`, `NO_COLOR`, `FORCE_COLOR`).
|
||
- For allow-always decisions in allowlist mode, known dispatch wrappers (`env`, `nice`, `nohup`, `stdbuf`, `timeout`) persist inner executable paths instead of wrapper paths. If unwrapping is not safe, no allowlist entry is persisted automatically.
|
||
- On Windows node hosts in allowlist mode, shell-wrapper runs via `cmd.exe /c` require approval (allowlist entry alone does not auto-allow the wrapper form).
|
||
- `system.notify` supports `--priority <passive|active|timeSensitive>` and `--delivery <system|overlay|auto>`.
|
||
- Node hosts ignore `PATH` overrides and strip dangerous startup/shell keys (`DYLD_*`, `LD_*`, `NODE_OPTIONS`, `PYTHON*`, `PERL*`, `RUBYOPT`, `SHELLOPTS`, `PS4`). If you need extra PATH entries, configure the node host service environment (or install tools in standard locations) instead of passing `PATH` via `--env`.
|
||
- On macOS node mode, `system.run` is gated by exec approvals in the macOS app (Settings → Exec approvals).
|
||
Ask/allowlist/full behave the same as the headless node host; denied prompts return `SYSTEM_RUN_DENIED`.
|
||
- On headless node host, `system.run` is gated by exec approvals (`~/.openclaw/exec-approvals.json`).
|
||
|
||
## Exec node binding
|
||
|
||
When multiple nodes are available, you can bind exec to a specific node.
|
||
This sets the default node for `exec host=node` (and can be overridden per agent).
|
||
|
||
Global default:
|
||
|
||
```bash
|
||
openclaw config set tools.exec.node "node-id-or-name"
|
||
```
|
||
|
||
Per-agent override:
|
||
|
||
```bash
|
||
openclaw config get agents.list
|
||
openclaw config set agents.list[0].tools.exec.node "node-id-or-name"
|
||
```
|
||
|
||
Unset to allow any node:
|
||
|
||
```bash
|
||
openclaw config unset tools.exec.node
|
||
openclaw config unset agents.list[0].tools.exec.node
|
||
```
|
||
|
||
## Permissions map
|
||
|
||
Nodes may include a `permissions` map in `node.list` / `node.describe`, keyed by permission name (e.g. `screenRecording`, `accessibility`) with boolean values (`true` = granted).
|
||
|
||
## Headless node host (cross-platform)
|
||
|
||
OpenClaw can run a **headless node host** (no UI) that connects to the Gateway
|
||
WebSocket and exposes `system.run` / `system.which`. This is useful on Linux/Windows
|
||
or for running a minimal node alongside a server.
|
||
|
||
Start it:
|
||
|
||
```bash
|
||
openclaw node run --host <gateway-host> --port 18789
|
||
```
|
||
|
||
Notes:
|
||
|
||
- Pairing is still required (the Gateway will show a device pairing prompt).
|
||
- The node host stores its node id, token, display name, and gateway connection info in `~/.openclaw/node.json`.
|
||
- Exec approvals are enforced locally via `~/.openclaw/exec-approvals.json`
|
||
(see [Exec approvals](/tools/exec-approvals)).
|
||
- On macOS, the headless node host executes `system.run` locally by default. Set
|
||
`OPENCLAW_NODE_EXEC_HOST=app` to route `system.run` through the companion app exec host; add
|
||
`OPENCLAW_NODE_EXEC_FALLBACK=0` to require the app host and fail closed if it is unavailable.
|
||
- Add `--tls` / `--tls-fingerprint` when the Gateway WS uses TLS.
|
||
|
||
## Mac node mode
|
||
|
||
- The macOS menubar app connects to the Gateway WS server as a node (so `openclaw nodes …` works against this Mac).
|
||
- In remote mode, the app opens an SSH tunnel for the Gateway port and connects to `localhost`.
|