{"id":636,"date":"2026-03-21T22:52:58","date_gmt":"2026-03-21T14:52:58","guid":{"rendered":"https:\/\/pa.yingzhi8.cn\/index.php\/2026\/03\/21\/security-contributing-threat-model\/"},"modified":"2026-03-22T05:00:08","modified_gmt":"2026-03-21T21:00:08","slug":"security-contributing-threat-model","status":"publish","type":"post","link":"https:\/\/pa.yingzhi8.cn\/index.php\/2026\/03\/21\/security-contributing-threat-model\/","title":{"rendered":"Contributing to the Threat Model"},"content":{"rendered":"<h1>Contributing to the Threat Model<\/h1>\n<h1>Contributing to the OpenClaw Threat Model<\/h1>\n<p>Thanks for helping make OpenClaw more secure. This threat model is a living document and we welcome contributions from anyone &#8211; you don&#8217;t need to be a security expert.<\/p>\n<h2>Ways to Contribute<\/h2>\n<h3>Add a Threat<\/h3>\n<p>Spotted an attack vector or risk we haven&#8217;t covered? Open an issue on <a href=\"https:\/\/github.com\/openclaw\/trust\/issues\">openclaw\/trust<\/a> and describe it in your own words. You don&#8217;t need to know any frameworks or fill in every field &#8211; just describe the scenario.<\/p>\n<p><strong>Helpful to include (but not required):<\/strong><\/p>\n<ul>\n<li>The attack scenario and how it could be exploited<\/li>\n<li>Which parts of OpenClaw are affected (CLI, gateway, channels, ClawHub, MCP servers, etc.)<\/li>\n<li>How severe you think it is (low \/ medium \/ high \/ critical)<\/li>\n<li>Any links to related research, CVEs, or real-world examples<\/li>\n<\/ul>\n<p>We&#8217;ll handle the ATLAS mapping, threat IDs, and risk assessment during review. If you want to include those details, great &#8211; but it&#8217;s not expected.<\/p>\n<blockquote>\n<p><strong>This is for adding to the threat model, not reporting live vulnerabilities.<\/strong> If you&#8217;ve found an exploitable vulnerability, see our <a href=\"https:\/\/trust.openclaw.ai\">Trust page<\/a> for responsible disclosure instructions.<\/p>\n<\/blockquote>\n<h3>Suggest a Mitigation<\/h3>\n<p>Have an idea for how to address an existing threat? Open an issue or PR referencing the threat. Useful mitigations are specific and actionable &#8211; for example, &#8220;per-sender rate limiting of 10 messages\/minute at the gateway&#8221; is better than &#8220;implement rate limiting.&#8221;<\/p>\n<h3>Propose an Attack Chain<\/h3>\n<p>Attack chains show how multiple threats combine into a realistic attack scenario. If you see a dangerous combination, describe the steps and how an attacker would chain them together. A short narrative of how the attack unfolds in practice is more valuable than a formal template.<\/p>\n<h3>Fix or Improve Existing Content<\/h3>\n<p>Typos, clarifications, outdated info, better examples &#8211; PRs welcome, no issue needed.<\/p>\n<h2>What We Use<\/h2>\n<h3>MITRE ATLAS<\/h3>\n<p>This threat model is built on <a href=\"https:\/\/atlas.mitre.org\/\">MITRE ATLAS<\/a> (Adversarial Threat Landscape for AI Systems), a framework designed specifically for AI\/ML threats like prompt injection, tool misuse, and agent exploitation. You don&#8217;t need to know ATLAS to contribute &#8211; we map submissions to the framework during review.<\/p>\n<h3>Threat IDs<\/h3>\n<p>Each threat gets an ID like <code>T-EXEC-003<\/code>. The categories are:<\/p>\n<table>\n<thead>\n<tr>\n<th>Code<\/th>\n<th>Category<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>RECON<\/td>\n<td>Reconnaissance &#8211; information gathering<\/td>\n<\/tr>\n<tr>\n<td>ACCESS<\/td>\n<td>Initial access &#8211; gaining entry<\/td>\n<\/tr>\n<tr>\n<td>EXEC<\/td>\n<td>Execution &#8211; running malicious actions<\/td>\n<\/tr>\n<tr>\n<td>PERSIST<\/td>\n<td>Persistence &#8211; maintaining access<\/td>\n<\/tr>\n<tr>\n<td>EVADE<\/td>\n<td>Defense evasion &#8211; avoiding detection<\/td>\n<\/tr>\n<tr>\n<td>DISC<\/td>\n<td>Discovery &#8211; learning about the environment<\/td>\n<\/tr>\n<tr>\n<td>EXFIL<\/td>\n<td>Exfiltration &#8211; stealing data<\/td>\n<\/tr>\n<tr>\n<td>IMPACT<\/td>\n<td>Impact &#8211; damage or disruption<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>IDs are assigned by maintainers during review. You don&#8217;t need to pick one.<\/p>\n<h3>Risk Levels<\/h3>\n<table>\n<thead>\n<tr>\n<th>Level<\/th>\n<th>Meaning<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Critical<\/strong><\/td>\n<td>Full system compromise, or high likelihood + critical impact<\/td>\n<\/tr>\n<tr>\n<td><strong>High<\/strong><\/td>\n<td>Significant damage likely, or medium likelihood + critical impact<\/td>\n<\/tr>\n<tr>\n<td><strong>Medium<\/strong><\/td>\n<td>Moderate risk, or low likelihood + high impact<\/td>\n<\/tr>\n<tr>\n<td><strong>Low<\/strong><\/td>\n<td>Unlikely and limited impact<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>If you&#8217;re unsure about the risk level, just describe the impact and we&#8217;ll assess it.<\/p>\n<h2>Review Process<\/h2>\n<ol>\n<li><strong>Triage<\/strong> &#8211; We review new submissions within 48 hours<\/li>\n<li><strong>Assessment<\/strong> &#8211; We verify feasibility, assign ATLAS mapping and threat ID, validate risk level<\/li>\n<li><strong>Documentation<\/strong> &#8211; We ensure everything is formatted and complete<\/li>\n<li><strong>Merge<\/strong> &#8211; Added to the threat model and visualization<\/li>\n<\/ol>\n<h2>Resources<\/h2>\n<ul>\n<li><a href=\"https:\/\/atlas.mitre.org\/\">ATLAS Website<\/a><\/li>\n<li><a href=\"https:\/\/atlas.mitre.org\/techniques\/\">ATLAS Techniques<\/a><\/li>\n<li><a href=\"https:\/\/atlas.mitre.org\/studies\/\">ATLAS Case Studies<\/a><\/li>\n<li><a href=\"\/security\/THREAT-MODEL-ATLAS\">OpenClaw Threat Model<\/a><\/li>\n<\/ul>\n<h2>Contact<\/h2>\n<ul>\n<li><strong>Security vulnerabilities:<\/strong> See our <a href=\"https:\/\/trust.openclaw.ai\">Trust page<\/a> for reporting instructions<\/li>\n<li><strong>Threat model questions:<\/strong> Open an issue on <a href=\"https:\/\/github.com\/openclaw\/trust\/issues\">openclaw\/trust<\/a><\/li>\n<li><strong>General chat:<\/strong> Discord #security channel<\/li>\n<\/ul>\n<h2>Recognition<\/h2>\n<p>Contributors to the threat model are recognized in the threat model acknowledgments, release notes, and the OpenClaw security hall of fame for significant contributions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Contributing to the Threat Model Contributing to the Op [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-636","post","type-post","status-publish","format-standard","hentry","category-docs"],"_links":{"self":[{"href":"https:\/\/pa.yingzhi8.cn\/index.php\/wp-json\/wp\/v2\/posts\/636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pa.yingzhi8.cn\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pa.yingzhi8.cn\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/pa.yingzhi8.cn\/index.php\/wp-json\/wp\/v2\/comments?post=636"}],"version-history":[{"count":5,"href":"https:\/\/pa.yingzhi8.cn\/index.php\/wp-json\/wp\/v2\/posts\/636\/revisions"}],"predecessor-version":[{"id":1125,"href":"https:\/\/pa.yingzhi8.cn\/index.php\/wp-json\/wp\/v2\/posts\/636\/revisions\/1125"}],"wp:attachment":[{"href":"https:\/\/pa.yingzhi8.cn\/index.php\/wp-json\/wp\/v2\/media?parent=636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pa.yingzhi8.cn\/index.php\/wp-json\/wp\/v2\/categories?post=636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pa.yingzhi8.cn\/index.php\/wp-json\/wp\/v2\/tags?post=636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}