NC-OC-014

Gateway auth token meets minimum length

๐ŸŸ  High โœ… Stable ๐Ÿ“Š Contributes to score

What this checks

Checks that the gateway bearer token is long enough to resist brute-force attacks. OpenClaw emits a warning when a token is below the minimum recommended length.

Why it matters

A gateway auth token that's too short for example, a memorable word or a short random string provides much weaker protection than a properly-generated cryptographic token. Bearer tokens used for API access should have enough entropy to make brute-force attacks computationally infeasible. OpenClaw sets a minimum length threshold; tokens below it are flagged.

How to fix it

Generate a properly-sized random token and update the gateway

# Generate a 32-byte (64 hex character) random token:
openssl rand -hex 32

# Set it:
openclaw gateway auth set --type bearer --token <new-token>
openclaw gateway restart

Store the new token securely. You'll need to update any clients (Slack apps, webhooks, mobile apps) that use the old token.

Technical details

FieldValue
Control IDNC-OC-014
DomainOC
SeverityHigh
StatusStable
Data sourceopenclaw_security_audit
Source typeauthoritative
CheckIdgateway.token_too_short
ModeMode 1 (OpenClaw native)
Introduced inLibrary v1.1.0

False positive notes

Only fires when a gateway auth token is set and is below OpenClaw's minimum length threshold. If no token is set at all, NC-OC-012 fires instead. If you've intentionally set a short token for local development, rotate it before any external exposure.

Suppress this finding

clawvitals exclude NC-OC-014 reason "local dev only not externally accessible"