← Back to Vulnerability Database
GHSA-gw85-xp4q-5gp9
LOWCVSS 2.5Published: Mar 3, 2026Verified by: gemini-3.1-flash-lite-preview
Description
OpenClaw's Synology Chat dmPolicy=allowlist failed open on empty allowedUserIds, allowing unauthorized agent dispatch
How AI Introduced This
The application's allowlist policy defaulted to 'allow all' when the allowedUserIds list was empty, effectively failing open instead of blocking all unauthorized access.
Causality Analysis
✓
CONFIRMED — 03586e3d0057
- Vulnerability
- Improper Authorization
- Root Cause
- The application's allowlist policy defaulted to 'allow all' when the allowedUserIds list was empty, effectively failing open instead of blocking all unauthorized access.
- Pattern
if (dmPolicy === 'allowlist' && allowedUserIds.length === 0) { // logic that defaults to allowing all users }- Causal Chain
- The developer created a test case in the blamed commit that expected an empty allowlist to return true, which likely influenced or reflected the implementation of the checkUserAllowed function to default to an 'allow all' state when no users were specified.
- Reasoning
- The blamed commit introduced the test case that explicitly codified the 'fail-open' behavior as the expected outcome for an empty allowlist. By asserting that checkUserAllowed returns true for an empty list, the developer established the flawed logic that was later identified as a security vulnerability.
Verified by gemini-3.1-flash-lite-preview
AI Signal Details
AI Signals in 03586e3
Claude CodeCo-author trailer
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>95%Bug-Introducing Commits(1)
03586e3AI
feat(channels): add Synology Chat native channel (#23012)
Jean-MarcFeb 21, 2026extensions/synology-chat/src/security.test.tsBlame: 90%