docs: fix Moltbot naming in security + formal verification pages

This commit is contained in:
vignesh07
2026-01-27 15:15:18 -08:00
parent 8198e826da
commit 98b136541b
2 changed files with 4 additions and 4 deletions

View File

@@ -28,7 +28,7 @@ It flags common footguns (Gateway auth exposure, browser control exposure, eleva
Running an AI agent with shell access on your machine is... *spicy*. Heres how to not get pwned. Running an AI agent with shell access on your machine is... *spicy*. Heres how to not get pwned.
Clawdbot is both a product and an experiment: youre wiring frontier-model behavior into real messaging surfaces and real tools. **There is no “perfectly secure” setup.** The goal is to be deliberate about: Moltbot is both a product and an experiment: youre wiring frontier-model behavior into real messaging surfaces and real tools. **There is no “perfectly secure” setup.** The goal is to be deliberate about:
- who can talk to your bot - who can talk to your bot
- where the bot is allowed to act - where the bot is allowed to act
- what the bot can touch - what the bot can touch
@@ -747,7 +747,7 @@ Mario asking for find ~
## Reporting Security Issues ## Reporting Security Issues
Found a vulnerability in Clawdbot? Please report responsibly: Found a vulnerability in Moltbot? Please report responsibly:
1. Email: security@clawd.bot 1. Email: security@clawd.bot
2. Don't post publicly until fixed 2. Don't post publicly until fixed

View File

@@ -10,7 +10,7 @@ This page tracks Moltbots **formal security models** (TLA+/TLC today; more as
> Moltbot was formerly named Clawdbot; some older references and commands may still use `clawdbot`. > Moltbot was formerly named Clawdbot; some older references and commands may still use `clawdbot`.
**Goal (north star):** provide a machine-checked argument that Clawdbot enforces its **Goal (north star):** provide a machine-checked argument that Moltbot enforces its
intended security policy (authorization, session isolation, tool gating, and intended security policy (authorization, session isolation, tool gating, and
misconfiguration safety), under explicit assumptions. misconfiguration safety), under explicit assumptions.
@@ -18,7 +18,7 @@ misconfiguration safety), under explicit assumptions.
- Each claim has a runnable model-check over a finite state space. - Each claim has a runnable model-check over a finite state space.
- Many claims have a paired **negative model** that produces a counterexample trace for a realistic bug class. - Many claims have a paired **negative model** that produces a counterexample trace for a realistic bug class.
**What this is not (yet):** a proof that “Clawdbot is secure in all respects” or that the full TypeScript implementation is correct. **What this is not (yet):** a proof that “Moltbot is secure in all respects” or that the full TypeScript implementation is correct.
## Where the models live ## Where the models live