Documentation Index
Fetch the complete documentation index at: https://docs.openclaw.ai/llms.txt
Use this file to discover all available pages before exploring further.
openclaw approvals
Manage exec approvals for the local host, gateway host, or a node host.
By default, commands target the local approvals file on disk. Use --gateway to target the gateway, or --node to target a specific node.
Alias: openclaw exec-approvals
Related:
- Exec approvals: Exec approvals
- Nodes: Nodes
openclaw exec-policy
openclaw exec-policy is the local convenience command for keeping the requested
tools.exec.* config and the local host approvals file aligned in one step.
Use it when you want to:
- inspect the local requested policy, host approvals file, and effective merge
- apply a local preset such as YOLO or deny-all
- synchronize local
tools.exec.*and local~/.openclaw/exec-approvals.json
- no
--json: prints the human-readable table view --json: prints machine-readable structured output
exec-policyis local-only- it updates the local config file and the local approvals file together
- it does not push policy to the gateway host or a node host
--host nodeis rejected in this command because node exec approvals are fetched from the node at runtime and must be managed through node-targeted approvals commands insteadopenclaw exec-policy showmarkshost=nodescopes as node-managed at runtime instead of deriving an effective policy from the local approvals file
openclaw approvals set --gateway
or openclaw approvals set --node <id|name|ip>.
Common commands
openclaw approvals get now shows the effective exec policy for local, gateway, and node targets:
- requested
tools.execpolicy - host approvals-file policy
- effective result after precedence rules are applied
- the host approvals file is the enforceable source of truth
- requested
tools.execpolicy can narrow or broaden intent, but the effective result is still derived from the host rules --nodecombines the node host approvals file with gatewaytools.execpolicy, because both still apply at runtime- if gateway config is unavailable, the CLI falls back to the node approvals snapshot and notes that the final runtime policy could not be computed
Replace approvals from a file
set accepts JSON5, not only strict JSON. Use either --file or --stdin, not both.
”Never prompt” / YOLO example
For a host that should never stop on exec approvals, set the host approvals defaults tofull + off:
tools.exec.host=gateway in this example:
host=autostill means “sandbox when available, otherwise gateway”.- YOLO is about approvals, not routing.
- If you want host exec even when a sandbox is configured, make the host choice explicit with
gatewayor/exec host=gateway.
tools.exec.* config and the
local approvals defaults together. It is equivalent in intent to the manual two-step
setup above, but only for the local machine.
Allowlist helpers
Common options
get, set, and allowlist add|remove all support:
--node <id|name|ip>--gateway- shared node RPC options:
--url,--token,--timeout,--json
- no target flags means the local approvals file on disk
--gatewaytargets the gateway host approvals file--nodetargets one node host after resolving id, name, IP, or id prefix
allowlist add|remove also supports:
--agent <id>(defaults to*)
Notes
--nodeuses the same resolver asopenclaw nodes(id, name, ip, or id prefix).--agentdefaults to"*", which applies to all agents.- The node host must advertise
system.execApprovals.get/set(macOS app or headless node host). - Approvals files are stored per host at
~/.openclaw/exec-approvals.json.