Skip to content

Bug: ALLOWED_CHAT_IDS env var propagation #896

@dmibaranov

Description

@dmibaranov

Description

The current implementation fails to propagate the ALLOWED_CHAT_IDS environment variable to the Telegram bridge child process. This results in a security bypass where any user can interact with the bot regardless of the whitelist settings.

Reproduction Steps

$ env | grep ALLOWED
ALLOWED_CHAT_IDS=<redacted>
$ nemoclaw start
[services] telegram-bridge started (PID 42541)
...
$ ps -wwp 42541 -E | grep ALLOWED || echo "missed"
missed

Environment

  • OS: macOS 26.3.1
  • Node.js: v25.2.1
  • Docker: Docker Desktop 4.62.0, Engine 29.2.1
  • NemoClaw: v0.1.0

Debug Output

Logs

Checklist

  • I confirmed this bug is reproducible
  • I searched existing issues and this is not a duplicate

Metadata

Metadata

Assignees

Labels

Integration: TelegramUse this label to identify Telegram bot integration issues with NemoClaw.bugSomething isn't workingpriority: highImportant issue that should be resolved in the next releasesecuritySomething isn't secure

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions