Skip to content

docs: add exec strategy patterns guide (A conservative / B convenience / C hybrid) #430

@thepagent

Description

@thepagent

Summary

Add a new docs page under docs/ to explain practical OpenClaw exec permission strategies for real-world agent setups.

The doc should explain three strategy patterns:

  • A. Conservative — tiny allowlist, maximum safety, frequent allowlist miss
  • B. Convenience — broad allowlist, best UX, highest risk
  • C. Hybrid — allow low-risk/common commands, keep dangerous ops behind approval, and route complex work to ACP/sub-agents

This came up after OpenClaw 2026.4.1, where exec approval / allowlist behavior became more consistently enforced, making policy design more visible to users.

Why

Users often see errors like:

  • exec denied: allowlist miss

and don't have a clear mental model for:

  • why tools.exec.security = "full" may still not mean "everything runs"
  • how exec-approvals.json interacts with openclaw.json
  • when to choose a small allowlist vs broad allowlist vs mixed model
  • how chat-bound main agents should differ from ACP/sub-agent or sandboxed execution models

A practical docs page would help users design an intentional policy instead of cargo-culting config snippets.

Proposed doc

Suggested file:

  • docs/exec_strategy_patterns.md

Proposed outline

1. Problem statement

Explain the common confusion:

  • tools.exec may look permissive
  • but effective execution still depends on approvals / allowlist state
  • newer releases enforce this more consistently

2. The three strategies

A. Conservative

  • tiny allowlist
  • strongest safety boundary
  • frequent friction
  • best when exec is rare or host safety dominates

B. Convenience

  • broad allowlist / near-full trust
  • smoothest UX
  • largest blast radius
  • best in isolated dev boxes or highly trusted environments

C. Hybrid

  • allow common low-risk binaries
  • keep high-risk operations gated by approval
  • route long/complex tasks to ACP/sub-agents
  • recommended default for chat-facing main agents

3. Decision guide

Map user intent to strategy:

  • "I barely use exec" → A
  • "This box is my dev sandbox" → B
  • "This is my main Telegram/Discord agent and I want balance" → C

4. Example allowlist tiers

Show examples like:

Tier 1: common developer utilities

  • bash, sh, env, python3, git, node, npm

Tier 2: low-risk file/text utilities

  • cat, ls, find, grep, sed, tee

Keep gated

  • sudo, docker, systemctl, destructive filesystem/admin tools

5. Operational guidance

  • add binaries incrementally based on real use
  • prefer approval for powerful/system-wide commands
  • use ACP/sub-agents for complex or long-running tasks
  • keep main chat agent capable but not all-powerful

6. Optional diagram

Include a lightweight ASCII diagram version that works well in markdown code blocks.

Suggested tone

Practical, opinionated, operator-focused. Not just configuration reference; more of a policy design guide.

Nice-to-have

Cross-link from:

  • exec approvals docs
  • configuration reference (tools.exec)
  • troubleshooting page for allowlist miss

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't workingpriority: mediumMedium priority

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions