Add documentation for all user/operator-facing changes introduced by the security review branch: rate limits, security headers, webhook HMAC verification, payload size limits, gateway token redaction, non-root containers, agent token logging, and prompt injection mitigation. Updated: docs/reference/api.md, docs/reference/authentication.md, docs/reference/configuration.md, docs/deployment/README.md, docs/operations/README.md, docs/openclaw_gateway_ws.md, backend/README.md. Created: docs/reference/security.md (consolidated security reference). Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
992 B
992 B
Authentication
Mission Control supports two auth modes via AUTH_MODE:
local: shared bearer token auth for self-hosted deploymentsclerk: Clerk JWT auth
Local mode
Backend:
AUTH_MODE=localLOCAL_AUTH_TOKEN=<token>
Frontend:
NEXT_PUBLIC_AUTH_MODE=local- Provide the token via the login UI.
Clerk mode
Backend:
AUTH_MODE=clerkCLERK_SECRET_KEY=<secret>
Frontend:
NEXT_PUBLIC_AUTH_MODE=clerkNEXT_PUBLIC_CLERK_PUBLISHABLE_KEY=<key>
Agent authentication
Autonomous agents authenticate via an X-Agent-Token header (not the bearer token used by human users). See API reference for details.
Security notes:
- Agent auth is rate-limited to 20 requests per 60 seconds per IP. Exceeding this returns
429 Too Many Requests. - Agent tokens are not logged on authentication failure — not even partially. If debugging agent auth issues, verify the token value at the source rather than looking for it in server logs.