A reverse proxy that enforces scope boundaries on OpenClaw gateway plugin routes and normalizes sandbox file paths before forwarding
OpenClaw's gateway plugin HTTP routes have a class of vulnerabilities where authenticated callers can escalate to operator.admin scope regardless of their actual permissions (CVE-2026-35669, CVSS 8.8), and sandboxed agents can read arbitrary files across workspaces through unnormalized path parameters (CVE-2026-35668). With 135K+ OpenClaw instances publicly exposed and six new HIGH-severity CVEs disclosed in April 2026 alone, a standalone reverse proxy that sits in front of the gateway and validates every plugin route call against the caller's granted scopes, while normalizing all file path parameters including mediaUrl and fileUrl aliases, would close these attack vectors without waiting for upstream patches.
Demand Breakdown
Social Proof 1 sources
Gap Assessment
4 tools exist (OpenClaw exec-policy CLI, openclaw-shield, Cisco DefenseClaw, openclaw-security-monitor) but gaps remain: Only covers exec tool approvals, not gateway plugin route scope enforcement or file path normalization; Focuses on output filtering and command blocking, not scope boundary enforcement on plugin HTTP routes.
Features4 agent-ready prompts
Competitive LandscapeFREE
| Product | Does | Missing |
|---|---|---|
| OpenClaw exec-policy CLI | Synchronizes requested tool exec config with local approvals file, hardening for node-host rejection and rollback safety | Only covers exec tool approvals, not gateway plugin route scope enforcement or file path normalization |
| openclaw-shield | Prevents secret leaks, PII exposure, and destructive command execution in OpenClaw agents | Focuses on output filtering and command blocking, not scope boundary enforcement on plugin HTTP routes |
| Cisco DefenseClaw | Enterprise security governance wrapper for OpenClaw with policy engine and audit logging | Enterprise-only, not available as a lightweight proxy. Does not specifically target scope escalation in gateway plugin routes |
| openclaw-security-monitor | Detects ClawHavoc, AMOS stealer, CVE-2026-25253, memory poisoning, and supply chain attacks | Detection and alerting only. Does not enforce scope boundaries or block path traversal in real time |
Sign in to unlock full access.