NC-OC-012

Gateway authentication not configured

๐Ÿ”ด Critical โœ… Stable ๐Ÿ“Š Contributes to score

What this checks

Checks that the OpenClaw gateway has an authentication token configured. A gateway without auth is accessible to any client that can reach it no credentials required.

Why it matters

The gateway is the entry point to your OpenClaw installation. Without authentication, anyone who can reach your gateway URL can send commands to your agent, read responses, and impersonate the operator. This is the most direct path to full unauthorised access no exploit needed, just an HTTP request.

How to fix it

Set a gateway auth token

Generate a strong random token:

openssl rand -hex 32

Set it on the gateway:

openclaw gateway auth set --type bearer --token <your-token>

Then restart the gateway: openclaw gateway restart

Store the token securely you'll need it to configure any clients (Slack apps, webhooks, mobile apps) that connect to this gateway.

Technical details

FieldValue
Control IDNC-OC-012
DomainOC
SeverityCritical
StatusStable
Data sourceopenclaw_security_audit
Source typeauthoritative
CheckIdgateway.loopback_no_auth
ModeMode 1 (OpenClaw native)
Introduced inLibrary v1.1.0

False positive notes

None expected. This is a binary configuration check either a gateway auth token is set or it isn't.

Suppress this finding

clawvitals exclude NC-OC-012 reason "your reason here"