refactor: rename clawdbot to moltbot with legacy compat

This commit is contained in:
Peter Steinberger
2026-01-27 12:19:58 +00:00
parent 83460df96f
commit 6d16a658e5
1839 changed files with 11250 additions and 11199 deletions

View File

@@ -1,6 +1,6 @@
# Security Policy
If you believe you've found a security issue in Clawdbot, please report it privately.
If you believe you've found a security issue in Moltbot, please report it privately.
## Reporting
@@ -9,19 +9,19 @@ If you believe you've found a security issue in Clawdbot, please report it priva
## Operational Guidance
For threat model + hardening guidance (including `clawdbot security audit --deep` and `--fix`), see:
For threat model + hardening guidance (including `moltbot security audit --deep` and `--fix`), see:
- `https://docs.molt.bot/gateway/security`
### Web Interface Safety
Clawdbot's web interface is intended for local use only. Do **not** bind it to the public internet; it is not hardened for public exposure.
Moltbot's web interface is intended for local use only. Do **not** bind it to the public internet; it is not hardened for public exposure.
## Runtime Requirements
### Node.js Version
Clawdbot requires **Node.js 22.12.0 or later** (LTS). This version includes important security patches:
Moltbot requires **Node.js 22.12.0 or later** (LTS). This version includes important security patches:
- CVE-2025-59466: async_hooks DoS vulnerability
- CVE-2026-21636: Permission model bypass vulnerability
@@ -34,7 +34,7 @@ node --version # Should be v22.12.0 or later
### Docker Security
When running Clawdbot in Docker:
When running Moltbot in Docker:
1. The official image runs as a non-root user (`node`) for reduced attack surface
2. Use `--read-only` flag when possible for additional filesystem protection
@@ -44,8 +44,8 @@ Example secure Docker run:
```bash
docker run --read-only --cap-drop=ALL \
-v clawdbot-data:/app/data \
clawdbot/clawdbot:latest
-v moltbot-data:/app/data \
moltbot/moltbot:latest
```
## Security Scanning