Skip to content

Bug: ALLOWED_CHAT_IDS env var propagation #896

@dmibaranov

Description

@dmibaranov

Description

The current implementation fails to propagate the ALLOWED_CHAT_IDS environment variable to the Telegram bridge child process. This results in a security bypass where any user can interact with the bot regardless of the whitelist settings.

Reproduction Steps

$ env | grep ALLOWED
ALLOWED_CHAT_IDS=<redacted>
$ nemoclaw start
[services] telegram-bridge started (PID 42541)
...
$ ps -wwp 42541 -E | grep ALLOWED || echo "missed"
missed

Environment

  • OS: macOS 26.3.1
  • Node.js: v25.2.1
  • Docker: Docker Desktop 4.62.0, Engine 29.2.1
  • NemoClaw: v0.1.0

Debug Output

Logs

Checklist

  • I confirmed this bug is reproducible
  • I searched existing issues and this is not a duplicate

Metadata

Metadata

Assignees

No one assigned

    Labels

    Integration: TelegramUse this label to identify Telegram bot integration issues with NemoClaw.bugSomething isn't workingpriority: highImportant issue that should be resolved in the next releasesecuritySomething isn't secure

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions