@randromeda/arbiter-openclaw 0.1.1 → 0.1.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +4 -0
- package/README.md +2 -0
- package/package.json +1 -1
package/CHANGELOG.md
CHANGED
|
@@ -2,6 +2,10 @@
|
|
|
2
2
|
|
|
3
3
|
All notable changes to `@randromeda/arbiter-openclaw` will be documented in this file.
|
|
4
4
|
|
|
5
|
+
## [0.1.2] - 2026-04-11
|
|
6
|
+
|
|
7
|
+
- Documented the safe canary-path smoke test for OpenClaw using `/tmp/arbiter-deny-test`.
|
|
8
|
+
|
|
5
9
|
## [0.1.1] - 2026-04-03
|
|
6
10
|
|
|
7
11
|
- Added local runtime auto-discovery from `~/.arbiter/config.json`.
|
package/README.md
CHANGED
|
@@ -103,6 +103,8 @@ The default protected tools are:
|
|
|
103
103
|
|
|
104
104
|
Use Arbiter policy to allow or deny these tools. The included Arbiter filesystem policy denies destructive delete commands and `apply_patch` file-deletion directives.
|
|
105
105
|
|
|
106
|
+
For a safer OpenClaw smoke test, the default policy also denies writes and shell commands that target the canary prefix `/tmp/arbiter-deny-test`. A normal chat prompt such as `Use the exec tool exactly once to run: mkdir -p /tmp/arbiter-deny-test/nested` should trigger an Arbiter block without relying on `rm -rf`.
|
|
107
|
+
|
|
106
108
|
## Development
|
|
107
109
|
|
|
108
110
|
Run plugin tests:
|