OpenClawCN 中文资料站开始 · 文档 · 进阶 · 动态 · 支持
安全配置高级
#security#hardening#auth#networking

OpenClaw 安全加固指南

生产环境中 OpenClaw 的安全加固最佳实践,包括认证、授权和网络配置。

最后更新2026-03-11

AI 摘要

这页重点

核心结论

生产环境中 OpenClaw 的安全加固最佳实践,包括认证、授权和网络配置。

适用主题

安全配置

高频关键词

security / hardening / auth / networking

可信信号

最后更新 2026-03-11

OpenClaw 安全加固指南

本文介绍生产环境中 OpenClaw 的安全加固措施。

认证配置

Token 认证

{
  "gateway": {
    "auth": {
      "mode": "token",
      "token": "${OPENCLAW_GATEWAY_TOKEN}",
      "token_expiry": "90d"
    }
  }
}

密码认证

{
  "gateway": {
    "auth": {
      "mode": "password",
      "password": "${OPENCLAW_PASSWORD}",
      "min_length": 12,
      "require_special": true
    }
  }
}

多因素认证

{
  "gateway": {
    "auth": {
      "mode": "mfa",
      "methods": ["totp", "sms"],
      "trusted_devices": 5
    }
  }
}

授权控制

基于角色的访问

{
  "authorization": {
    "roles": {
      "admin": {
        "permissions": ["*"]
      },
      "user": {
        "permissions": ["chat", "read"]
      },
      "guest": {
        "permissions": ["chat"]
      }
    }
  }
}

技能权限

{
  "skills": {
    "permissions": {
      "network": {
        "allowed_domains": ["api.example.com"],
        "blocked_domains": ["*.evil.com"]
      },
      "filesystem": {
        "allowed_paths": ["/data/openclaw"],
        "max_size": "100MB"
      },
      "commands": {
        "allowed": ["git", "npm", "pnpm"],
        "denied": ["rm -rf", "sudo"]
      }
    }
  }
}

网络安全

绑定地址

{
  "gateway": {
    "bind": "127.0.0.1",
    "port": 18789,
    "allowed_ips": ["127.0.0.1", "10.0.0.0/8"]
  }
}

TLS 配置

{
  "gateway": {
    "tls": {
      "enabled": true,
      "cert": "/path/to/cert.pem",
      "key": "/path/to/key.pem",
      "min_version": "1.2"
    }
  }
}

防火墙规则

# 只允许本地和内网访问
iptables -A INPUT -p tcp --dport 18789 -s 127.0.0.1 -j ACCEPT
iptables -A INPUT -p tcp --dport 18789 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 18789 -j DROP

渠道安全

WhatsApp 安全

{
  "channels": {
    "whatsapp": {
      "allowFrom": ["+15555550123", "+15555550124"],
      "require_encryption": true,
      "max_message_length": 4096
    }
  }
}

Telegram 安全

{
  "channels": {
    "telegram": {
      "allowed_users": ["user_id_1", "user_id_2"],
      "group_mode": "mention_only",
      "bot_commands": ["/start", "/help", "/status"]
    }
  }
}

审计日志

启用审计

{
  "audit": {
    "enabled": true,
    "level": "detailed",
    "retention": "180d",
    "events": [
      "authentication",
      "authorization",
      "channel_access",
      "skill_execution",
      "data_access"
    ]
  }
}

日志格式

{
  "audit": {
    "format": "json",
    "output": "file",
    "path": "/var/log/openclaw/audit.log",
    "rotate": {
      "max_size": "100MB",
      "max_files": 10
    }
  }
}

数据保护

加密存储

{
  "storage": {
    "encryption": {
      "enabled": true,
      "algorithm": "AES-256-GCM",
      "key_rotation": "30d"
    }
  }
}

敏感数据

{
  "security": {
    "mask_sensitive": true,
    "patterns": [
      "\\d{4}-\\d{4}-\\d{4}-\\d{4}",  # 信用卡
      "sk-[a-zA-Z0-9]+",  # API Key
      "password[=:]\\S+"  # 密码
    ]
  }
}

入侵检测

异常检测

{
  "security": {
    "intrusion_detection": {
      "enabled": true,
      "failed_auth_threshold": 5,
      "rate_limit": {
        "requests_per_minute": 60,
        "burst": 10
      }
    }
  }
}

告警配置

{
  "alerts": {
    "channels": ["email", "slack"],
    "rules": [
      {
        "event": "failed_auth",
        "threshold": 3,
        "action": "notify"
      },
      {
        "event": "suspicious_activity",
        "action": "block"
      }
    ]
  }
}

定期安全检查

检查清单

# 1. 检查认证配置
openclaw doctor --auth

# 2. 检查开放端口
netstat -tlnp | grep openclaw

# 3. 检查日志异常
openclaw logs --anomaly

# 4. 检查证书过期
openclaw cert check

# 5. 检查更新
openclaw update check

下一步

继续深入

把零散经验接成稳定方法

最佳实践更适合在你已经跑通基础链路后阅读。可以顺着前后文继续看,也可以回到实践列表按难度和场景筛选。

关联入口

同主题、同路径、同阶段