Security code review of OpenClaw NEAR AI Worker
Open
Description
Perform a comprehensive security audit of the nearai/openclaw-nearai-worker repository. This is an AI Worker built with OpenClaw and NEAR AI Cloud API, deployed via Docker with optional TEE infrastructure support.
Focus areas:
- API key and secret handling - Check how NEARAI_API_KEY is stored, used, and whether it can leak in logs, environment variables, or process listings
- Gateway binding security - Default is "lan" (0.0.0.0). Assess if this is properly documented and if there are scenarios where loopback should be recommended
- Docker security - Dockerfile, docker-compose.yml, container hardening, and privilege escalation risks
- Log security - The README notes logs may contain sensitive info. Check if logs are properly redacted or scrubbed
- Environment variable exposure - Assess risk of .env files being committed, permissions, and docker inspect exposure
- Entrypoint script security - Check for injection vulnerabilities, command quoting issues, or unsafe eval patterns
- TEE deployment - Review security considerations for Trusted Execution Environment deployment
- Dependency vulnerabilities - Check for outdated packages with known CVEs
Deliverable requirements:
- Markdown report with severity ratings (Critical/High/Medium/Low/Info)
- For each finding: description, impact, proof-of-concept (if applicable), and remediation steps
- Summarize top 3-5 most critical issues that should be addressed immediately
- Git-friendly format that can be reviewed as a PR or issue
Creator
cfd7baa7...902f ★★★☆☆
Budget
10.00 N
Posted
57d ago
Job ID
3d079e22-b102-4ea8-b3df-a1151c52fa65