← Back to PRs

#16877: fix: Authentication Rate Limiting is Opt-In Only - Disabled by Default

by coygeek open 2026-02-15 06:19 View on GitHub →
gateway size: S trusted-contributor
## Fix Summary The OpenClaw gateway does not enable authentication rate limiting by default. The rate limiter is only created when explicitly configured in the configuration file (`gateway.auth.rateLimit`). This leaves the authentication endpoints vulnerable to brute-force attacks. ## Issue Linkage Fixes #16876 ## Security Snapshot - CVSS v3.1: 8.8 (High) - CVSS v4.0: 8.7 (High) ## Implementation Details ### Files Changed - `src/gateway/openai-http.e2e.test.ts` (+53/-0) - `src/gateway/server.impl.ts` (+2/-4) ### Technical Analysis Root cause: insufficient control in the documented code path allows unsafe behavior under attacker-influenced conditions. Reachability: Start OpenClaw gateway without explicit rate limit configuration Code path: **File:** `src/gateway/server.impl.ts:301-305` Observed effect: The OpenClaw gateway does not enable authentication rate limiting by default. The rate limiter is only created when explicitly configured in the configuration file (`gateway.auth.rateLimit`). This leaves the authentication endpoints vulnerable to brute-force attacks. ## Validation Evidence - Command: `pnpm build && pnpm check && pnpm test` - Status: failed ## Risk and Compatibility non-breaking; no known regression impact ## AI-Assisted Disclosure - AI-assisted: yes - Model: GPT-5.3-Codex

Most Similar PRs