mirror of
https://github.com/openclaw/openclaw.git
synced 2026-04-19 01:27:28 +00:00
fix: secure chrome extension relay cdp
This commit is contained in:
@@ -610,6 +610,7 @@ access those accounts and data. Treat browser profiles as **sensitive state**:
|
||||
- Disable browser sync/password managers in the agent profile if possible (reduces blast radius).
|
||||
- For remote gateways, assume “browser control” is equivalent to “operator access” to whatever that profile can reach.
|
||||
- Keep the Gateway and node hosts tailnet-only; avoid exposing relay/control ports to LAN or public Internet.
|
||||
- The Chrome extension relay’s CDP endpoint is auth-gated; only OpenClaw clients can connect.
|
||||
- Disable browser proxy routing when you don’t need it (`gateway.nodes.browser.mode="off"`).
|
||||
- Chrome extension relay mode is **not** “safer”; it can take over your existing Chrome tabs. Assume it can act as you in whatever that tab/profile can reach.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user