Summary
Add a new docs page under docs/ to explain practical OpenClaw exec permission strategies for real-world agent setups.
The doc should explain three strategy patterns:
- A. Conservative — tiny allowlist, maximum safety, frequent
allowlist miss
- B. Convenience — broad allowlist, best UX, highest risk
- C. Hybrid — allow low-risk/common commands, keep dangerous ops behind approval, and route complex work to ACP/sub-agents
This came up after OpenClaw 2026.4.1, where exec approval / allowlist behavior became more consistently enforced, making policy design more visible to users.
Why
Users often see errors like:
exec denied: allowlist miss
and don't have a clear mental model for:
- why
tools.exec.security = "full" may still not mean "everything runs"
- how
exec-approvals.json interacts with openclaw.json
- when to choose a small allowlist vs broad allowlist vs mixed model
- how chat-bound main agents should differ from ACP/sub-agent or sandboxed execution models
A practical docs page would help users design an intentional policy instead of cargo-culting config snippets.
Proposed doc
Suggested file:
docs/exec_strategy_patterns.md
Proposed outline
1. Problem statement
Explain the common confusion:
tools.exec may look permissive
- but effective execution still depends on approvals / allowlist state
- newer releases enforce this more consistently
2. The three strategies
A. Conservative
- tiny allowlist
- strongest safety boundary
- frequent friction
- best when exec is rare or host safety dominates
B. Convenience
- broad allowlist / near-full trust
- smoothest UX
- largest blast radius
- best in isolated dev boxes or highly trusted environments
C. Hybrid
- allow common low-risk binaries
- keep high-risk operations gated by approval
- route long/complex tasks to ACP/sub-agents
- recommended default for chat-facing main agents
3. Decision guide
Map user intent to strategy:
- "I barely use exec" → A
- "This box is my dev sandbox" → B
- "This is my main Telegram/Discord agent and I want balance" → C
4. Example allowlist tiers
Show examples like:
Tier 1: common developer utilities
bash, sh, env, python3, git, node, npm
Tier 2: low-risk file/text utilities
cat, ls, find, grep, sed, tee
Keep gated
sudo, docker, systemctl, destructive filesystem/admin tools
5. Operational guidance
- add binaries incrementally based on real use
- prefer approval for powerful/system-wide commands
- use ACP/sub-agents for complex or long-running tasks
- keep main chat agent capable but not all-powerful
6. Optional diagram
Include a lightweight ASCII diagram version that works well in markdown code blocks.
Suggested tone
Practical, opinionated, operator-focused. Not just configuration reference; more of a policy design guide.
Nice-to-have
Cross-link from:
- exec approvals docs
- configuration reference (
tools.exec)
- troubleshooting page for
allowlist miss
Summary
Add a new docs page under
docs/to explain practical OpenClawexecpermission strategies for real-world agent setups.The doc should explain three strategy patterns:
allowlist missThis came up after OpenClaw
2026.4.1, whereexecapproval / allowlist behavior became more consistently enforced, making policy design more visible to users.Why
Users often see errors like:
exec denied: allowlist missand don't have a clear mental model for:
tools.exec.security = "full"may still not mean "everything runs"exec-approvals.jsoninteracts withopenclaw.jsonA practical docs page would help users design an intentional policy instead of cargo-culting config snippets.
Proposed doc
Suggested file:
docs/exec_strategy_patterns.mdProposed outline
1. Problem statement
Explain the common confusion:
tools.execmay look permissive2. The three strategies
A. Conservative
B. Convenience
C. Hybrid
3. Decision guide
Map user intent to strategy:
4. Example allowlist tiers
Show examples like:
Tier 1: common developer utilities
bash,sh,env,python3,git,node,npmTier 2: low-risk file/text utilities
cat,ls,find,grep,sed,teeKeep gated
sudo,docker,systemctl, destructive filesystem/admin tools5. Operational guidance
6. Optional diagram
Include a lightweight ASCII diagram version that works well in markdown code blocks.
Suggested tone
Practical, opinionated, operator-focused. Not just configuration reference; more of a policy design guide.
Nice-to-have
Cross-link from:
tools.exec)allowlist miss