Vibe Security Radar
← Back to Vulnerability Database

GHSA-gw85-xp4q-5gp9

LOWCVSS 2.5
Published: Mar 3, 2026Verified by: gemini-3.1-flash-lite-preview
Description

OpenClaw's Synology Chat dmPolicy=allowlist failed open on empty allowedUserIds, allowing unauthorized agent dispatch

How AI Introduced This

The application's allowlist policy defaulted to 'allow all' when the allowedUserIds list was empty, effectively failing open instead of blocking all unauthorized access.

Causality Analysis

CONFIRMED03586e3d0057
Vulnerability
Improper Authorization
Root Cause
The application's allowlist policy defaulted to 'allow all' when the allowedUserIds list was empty, effectively failing open instead of blocking all unauthorized access.
Pattern
if (dmPolicy === 'allowlist' && allowedUserIds.length === 0) { // logic that defaults to allowing all users }
Causal Chain
The developer created a test case in the blamed commit that expected an empty allowlist to return true, which likely influenced or reflected the implementation of the checkUserAllowed function to default to an 'allow all' state when no users were specified.
Reasoning
The blamed commit introduced the test case that explicitly codified the 'fail-open' behavior as the expected outcome for an empty allowlist. By asserting that checkUserAllowed returns true for an empty list, the developer established the flawed logic that was later identified as a security vulnerability.

Verified by gemini-3.1-flash-lite-preview

AI Signal Details

AI Signals in 03586e3
Claude CodeCo-author trailerCo-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>95%

Bug-Introducing Commits(1)

feat(channels): add Synology Chat native channel (#23012)

Jean-MarcFeb 21, 2026extensions/synology-chat/src/security.test.tsBlame: 90%

Fix Commits(2)

0ee3036openclaw/openclaw/0ee3036github_advisory
7655c0copenclaw/openclaw/7655c0cgithub_advisory
References