Skip to content

[Security]: security audit does not flag tokens with no expiry or rotation policy #16

@Techris93

Description

@Techris93

Bug type

Missing check

Summary

openclaw security audit checks token length (gateway.token_too_short)
but never flags tokens that lack an expiry date or rotation policy.
The threat model (T-PERSIST-004) lists token persistence as High risk with
mitigation "None — tokens don't expire by default." A stolen token grants
indefinite access until manually revoked.
The audit should warn when gateway.auth.token is configured but no
expiry or rotation mechanism is in place.

Expected behavior

The audit should emit a finding like:
[warn] gateway.token_no_expiry — Gateway token has no expiry configured

Actual behavior

No finding is emitted regardless of token expiry configuration.

OpenClaw version

Latest (2026.3.2)

Operating system

All

Impact and severity

Medium — defense-in-depth, not a vulnerability

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions