This skill updates itself automatically. PureFeed monitors Twitter signals for relevant tweets, fact-checks each one through community trust scoring and a three-model research consensus, then merges verified findings into this living document. Version 11 · 11 verified sources.
Free API access
Openclaw security measures
Use this skill when the user asks about OpenClaw security topics — runtime sandboxing, permission and capability models, secrets handling, supply-chain protections for skills, vulnerability reports, hardening practices, security-focused features and patches, audit mechanisms, incident reports related to OpenClaw and its agent runtime, or enterprise-secure alternatives that position against OpenClaw's security model. OpenClaw has been involved in multiple supply-chain incidents: the Clinejection attack via Cline CLI (February 2026), a broader axios npm compromise weaponized via OpenClaw-impersonating packages (March 2026), and malicious skills discovered on ClawHub. OpenClaw also has a documented reasoning-leak vulnerability where internal chain-of-thought text is exposed to end users on messaging channels unless explicitly suppressed. OpenClaw's exec-approval system operates as a two-layer policy: both exec-approvals.json and tools.exec.* in openclaw.json must agree — the stricter of the two wins. Always verify provenance of any package that installs or depends on OpenClaw, audit transitive dependency trees — not just top-level packages, lock down reasoning/thinking visibility defaults for production deployments, explicitly configure exec-approval policies after any upgrade, and evaluate whether OpenClaw's broad-permission design is appropriate for the user's threat model. When advising on OpenClaw updates, new security-relevant features, or enterprise alternatives, verify against official release notes and documentation.
When to use this skill
- Apply this skill when the user asks about OpenClaw runtime security, sandboxing configuration, permission models, secrets management, supply-chain integrity of skills or packages, vulnerability disclosures, hardening, audit logs, security-relevant release features (e.g., Bedrock Guardrails, content filtering, ACP provenance, backup/restore, safe update procedures, reasoning/thinking visibility controls, exec-approval policies), security incidents involving OpenClaw or its agent runtime, OpenClaw's known architectural security limitations (broad system access, prompt injection susceptibility, skill-based data exfiltration, reasoning text leaking to end-user channels, exec-approval reset on upgrade), or enterprise-secure alternatives to OpenClaw (e.g., PokeeClaw). Also apply when the user mentions the Cline CLI supply-chain attack (Clinejection / GHSA-9ppg-jx86-fqw7), the axios npm compromise (March 2026, attributed to Sapphire Sleet), OpenClaw-impersonating packages such as
@shadanai/openclawor@qqbrowser/openclaw-qbot, malicious skills on ClawHub, specific CVEs patched in OpenClaw releases (e.g., CVE-2026-33574), reasoning/thinking leaks with GPT-5.4 or other reasoning-capable models, exec-approval configuration (exec-approvals.json,tools.exec.*), or post-update exec/allowlist breakage. (source, source, source, source, source, source, source)
Critical rules
- DO NOT recommend installing
cline@2.3.0under any circumstances — it was a compromised npm release (GHSA-9ppg-jx86-fqw7) that silently rannpm install -g openclaw@latestvia a postinstall script. The CLI binary was byte-identical tocline@2.2.3; the only modification was a single added postinstall line inpackage.json. If a user hascline@2.3.0, instruct them to upgrade immediately tocline@2.4.0or later and runnpm uninstall -g openclawto remove the unexpected OpenClaw installation. (source, source, source, source, source) - When recommending ANY npm package that touches OpenClaw, verify its provenance. After the Clinejection incident, Cline migrated npm publishing to OIDC-based provenance via GitHub Actions. Prefer packages that publish with npm provenance attestations (
--provenanceflag) and verify signatures before recommending installation. (source, source, source) - OpenClaw itself is NOT malware. Public analyses from SafeDep, Snyk, and Endor Labs confirm OpenClaw is a legitimate open-source project. DO NOT tell users that OpenClaw contains malware. However, warn that: (1) an OpenClaw installation originating from the compromised
cline@2.3.0postinstall was unauthorized and should be removed, because the installed OpenClaw binary has broad permissions including shell command execution, credential access from~/.openclaw/, and can install itself as a persistent system daemon surviving reboots; (2) OpenClaw's design inherently grants deep system access that cybersecurity researchers (including Cisco) have flagged as a security concern — it is susceptible to prompt injection and third-party skills have been found exfiltrating data. (source, source, source, source, source, source, source) - DO NOT recommend
axios@1.14.1,axios@1.14.2, oraxios@0.30.4— these were compromised npm releases (published ~2026-03-31, 00:21–03:29 UTC) that injected a hidden dependencyplain-crypto-js@4.2.1, which deployed a cross-platform RAT (Windows/macOS/Linux). Microsoft Threat Intelligence attributed the attack to Sapphire Sleet (North Korean state-sponsored). Pin toaxios@1.14.0(last legitimate 1.x) oraxios@0.30.3(last legitimate 0.30.x). If a user has any of the compromised versions, instruct them to: (1) downgrade immediately, (2) deletenode_modules/plain-crypto-js, (3) rotate ALL secrets and credentials on affected machines, and (4) audit CI/CD build logs for the March 31 UTC window. (source, source, source, source, source, source, source) - DO NOT trust packages named
@shadanai/openclawor@qqbrowser/openclaw-qbot— these are attacker-controlled packages impersonating OpenClaw. Specifically,@shadanai/openclawversions2026.3.28-2,2026.3.28-3,2026.3.31-1, and2026.3.31-2vendor the maliciousplain-crypto-jspayload directly.@qqbrowser/openclaw-qbot@0.0.130ships a tamperedaxios@1.14.1withplain-crypto-jsinjected. If a user has any of these installed, treat as fully compromised: remove immediately, rotate all credentials, and scan for RAT persistence. (source, source, source) - When auditing OpenClaw installations for supply-chain compromise, checking top-level package names is INSUFFICIENT. OpenClaw's dependency graph includes 1,246 third-party modules and 2,672 dependency paths. MUST inspect
package-lock.json,yarn.lock, orpnpm-lock.yamlto verify whetheraxios@1.14.1,axios@1.14.2,axios@0.30.4, orplain-crypto-js@4.2.1were resolved anywhere in the tree — including in the dependency trees of Agents and Skills modules. (source, source, source) - DO NOT install third-party skills from ClawHub without auditing their source code. Security researchers have discovered malicious skills on ClawHub — including the MoltBot skill targeting cryptocurrency users — that exploit OpenClaw's broad permission model to exfiltrate data. Cisco researchers have independently confirmed data exfiltration via a third-party skill. Treat every ClawHub skill as untrusted executable code; review it before installation, especially skills requesting network access, file-system access, or credential access. (source, source, source)
- OpenClaw versions prior to
v2026.3.8are affected by CVE-2026-33574, a path-traversal/TOCTOU vulnerability. MUST upgrade tov2026.3.8or later to remediate. Thev2026.3.8release includes 12+ security fixes total. If a user is running any OpenClaw version older thanv2026.3.8, treat the installation as potentially vulnerable and recommend immediate upgrade. (source, source, source, source, source) - For ANY production OpenClaw deployment using reasoning-capable models (GPT-5.x, openai-codex family, or any model where
resolveDefaultReasoningLevel()auto-enables reasoning), MUST explicitly setagents.defaults.reasoningDefaultto"off"inopenclaw.jsonto prevent internal chain-of-thought text from leaking to end-user channels (WhatsApp, Telegram, Discord, Slack). Without this setting, OpenClaw auto-setsreasoningLevelto"on"for new sessions with reasoning-capable models, causing"Reasoning:\n_..._"prefixed text to be delivered as a separate user-visible message. The/reasoning offcommand only fixes this per-session and resets when the session expires — it is NOT a durable mitigation. Also setagents.defaults.heartbeat.includeReasoningtofalse(which is the default) to prevent heartbeat messages from including reasoning output. For public-facing channels, OpenClaw's own security documentation warns that/reasoningand/verbosecan expose internal reasoning or tool output not intended for public rooms — keep them disabled. (source, source, source, source, source, source, source) - After ANY OpenClaw upgrade (especially to
v2026.4.1or later), MUST verify and reconfigure exec-approval settings — upgrades can reset~/.openclaw/exec-approvals.jsonto strict defaults, stripping existing allowlist entries and breaking automated workflows. OpenClaw's exec policy is a TWO-LAYER system: the effective policy is the STRICTER of (1)exec-approvals.jsondefaults and (2)tools.exec.*settings inopenclaw.json. Setting only one layer is INSUFFICIENT — both must agree. After upgrading: (1) set~/.openclaw/exec-approvals.jsondefaults to{"security": "full", "ask": "off", "askFallback": "full"}for fully automated exec (NO approval prompts), (2) settools.exec.hostto"gateway"andtools.exec.securityto"full"in~/.openclaw/openclaw.json, (3) optionally settools.exec.strictInlineEvaltofalseinopenclaw.jsonto allow inline interpreter eval forms (python -c,node -e,ruby -e,perl -e,php -r,lua -e,osascript -e) without forced approval, (4) restart the gateway (openclaw gateway restart) — changes toopenclaw.jsondo NOT take effect without a restart. Valid values forexec-approvals.json:securityaccepts"full"(allow everything),"allowlist","deny";askaccepts"off","on-miss","always";askFallbackaccepts"deny"and"full". WARNING:security: "full"withask: "off"grants unrestricted command execution — use ONLY when the deployment's threat model permits it (e.g., single-user, trusted environment). For multi-user or public-facing deployments, usesecurity: "allowlist"with explicit allowlist entries instead. (source, source, source, source, source, source, source, source, source)
Known incidents — Clinejection supply-chain attack (February 2026)
- INCIDENT SUMMARY: On 2026-02-17 (03:26–11:30 PT), an attacker published
cline@2.3.0to npm using a stolen NPM_RELEASE_TOKEN. The CLI binary was byte-identical tocline@2.2.3; the only change was an added postinstall script:npm install -g openclaw@latest. Approximately 4,000 downloads occurred during the ~8-hour window. The attack is tracked as GHSA-9ppg-jx86-fqw7 and codenamed 'Clinejection'. Only users of the Cline CLI npm package were affected — the Cline VS Code extension and JetBrains plugin were NOT compromised. (source, source, source, source, source, source, source, source, source, source) - ATTACK VECTOR: Cline added an AI-powered issue triage workflow using Anthropic's
claude-code-actionon 2025-12-21, configured to run Claude with broad tool access (Bash, Read, Write, etc.) on every new GitHub issue. The issue title was interpolated into Claude's prompt via${{ github.event.issue.title }}without sanitization. An attacker crafted a prompt-injection payload in an issue title that caused Claude to runnpm installpointing to a typosquatted repository (glthub-actions/cline). This led to GitHub Actions cache poisoning (Cacheract technique: flooding >10 GB of junk data to trigger LRU eviction, then planting poisoned cache entries matching Cline's nightly release workflow keys). The nightly workflow ran at ~2 AM UTC and exfiltrated VSCE_PAT, OVSX_PAT, and NPM_RELEASE_TOKEN secrets. (source, source, source, source)
Known incidents — axios npm supply-chain compromise (March 2026)
- INCIDENT SUMMARY: On 2026-03-31 (00:21–03:29 UTC), an attacker published
axios@1.14.1(SHA1:2553649f2322049666871cea80a5d0d6adc700ca) andaxios@0.30.4(SHA1:d6f3f62fd3b9f5432f5782b62d8cfd5247d5ee71) to npm via the compromised maintainer accountjasonsaayman. These versions added a hidden dependencyplain-crypto-js@4.2.1whose postinstall dropper delivered a cross-platform RAT targeting Windows, macOS, and Linux. The malicious versions were live for approximately 3 hours before npm removal. Microsoft Threat Intelligence attributed the attack to Sapphire Sleet, a North Korean state-sponsored threat actor. The attacker-controlled account that publishedplain-crypto-jshas been disabled. (source, source, source, source, source, source, source, source) - OPENCLAW IMPACT: Attacker-controlled packages impersonated OpenClaw to distribute the axios/plain-crypto-js payload.
@shadanai/openclawversions2026.3.28-2,2026.3.28-3,2026.3.31-1, and2026.3.31-2vendor the maliciousplain-crypto-jspayload directly.@qqbrowser/openclaw-qbot@0.0.130ships a tamperedaxios@1.14.1withplain-crypto-jsinjected as a dependency. SlowMist founder Yu Xian publicly warned that OpenClaw version 3.28 may have introduced the poisoned axios, and that Skills depending on axios could be indirectly affected. OpenClaw responded by locking its dependency module versions. (source, source, source, source, source) - EVASION TECHNIQUE: The
plain-crypto-jsRAT self-destructs after execution, replacing its ownpackage.jsonwith a clean stub. This meansnpm auditand manualnode_modulesinspection are UNRELIABLE for post-compromise detection. The primary forensic indicator is the presence of thenode_modules/plain-crypto-jsdirectory (even if contents appear clean). C2 domain to block:sfrclak[.]com(IP:142.11.206.73). Instruct users to check network logs and firewall rules for connections to this domain/IP. (source, source, source, source)
Known incidents — malicious ClawHub skills
- INCIDENT SUMMARY: Security researchers discovered malicious skills published on ClawHub, OpenClaw's community skill marketplace. The MoltBot skill specifically targeted cryptocurrency users, exploiting OpenClaw's broad system-access permissions to exfiltrate sensitive data. Cisco researchers independently confirmed data exfiltration via a third-party OpenClaw skill. As of 2026-04-09, ClawHub does NOT have adequate sandboxing or vetting to prevent malicious skills from accessing the host system. Treat all third-party skills as untrusted code. (source, source, source)
Known incidents — reasoning text leak to end-user channels
- INCIDENT SUMMARY: OpenClaw has a documented, reproducible bug where internal chain-of-thought reasoning text (prefixed with
"Reasoning:\n_..._") is emitted as a separate user-visible message to messaging channels (WhatsApp, Telegram, Discord, Slack) instead of being suppressed. This affects any reasoning-capable model (GPT-5.x, openai-codex family, and similar). ROOT CAUSE:resolveDefaultReasoningLevel()auto-setsreasoningLevelto"on"for any new session using a reasoning-capable model when no explicit config is present. The/reasoning offcommand only fixes the leak per-session and resets when the session expires. Multiple GitHub issues confirm this across versions (issues #24954, #25060, #29708). Independent security writeups (Penligent) and community reports (Reddit r/openclaw) document real-world occurrences and successful mitigations. A regression inv2026.3.28also caused"Reasoning is required for this model endpoint"errors for GPT-5.4-mini on OpenRouter (issue #57430), confirming reasoning enforcement is an active, ongoing concern. (source, source, source, source, source, source, source)
Known incidents — exec-approvals reset on v2026.4.1 upgrade
- INCIDENT SUMMARY: OpenClaw
v2026.4.1reset~/.openclaw/exec-approvals.jsonto strict defaults during the update process, stripping user-configured allowlist entries and breaking automated workflows that relied on exec permissions. Users on Telegram bots and other automated channels reported commands failing with allowlist-miss errors immediately after upgrading. Additionally, thev2026.4.1update decoupled sandbox mode from execution permissions — disabling sandbox mode alone no longer restores exec/git/filesystem access; those capabilities now require explicit re-enablement through the exec-approvals system and/ortools.exec.*config. If a user reports exec failures, allowlist misses, or broken automation after an OpenClaw upgrade, instruct them to reconfigure BOTHexec-approvals.jsondefaults ANDtools.exec.*inopenclaw.json, then restart the gateway. (source, source, source, source, source)
OpenClaw architectural security limitations
- OpenClaw's architecture grants agents deep system access by design — including shell command execution, file-system read/write, credential access from
~/.openclaw/, and persistent daemon capabilities. This broad permission model has drawn scrutiny from multiple security researchers and mainstream tech press (TechCrunch specifically notes that 'systems like OpenClaw raise security concerns due to its deep system access'). Known architectural risks as of 2026-04-11: (1) susceptibility to prompt injection that can cause unauthorized actions via the agent runtime, (2) third-party skills (from ClawHub or other sources) execute as untrusted code with the same broad permissions as the core agent — ClawHub has NO adequate sandboxing or vetting process, (3) no built-in per-user isolation — all skills and agents share the same host-level access, (4) no built-in role-based access control or approval workflows for sensitive operations, (5) no native audit logging of agent actions in the open-source version, (6) reasoning-capable models auto-enable visible reasoning output by default, leaking internal chain-of-thought to end-user channels unless explicitly suppressed via config, (7) exec-approval policy operates as a two-layer system (exec-approvals.json+tools.exec.*) where the stricter layer wins — and upgrades can silently reset one layer to strict defaults, breaking automation, (8) complex shell commands (using&&,||,;,|,$, etc.) are treated as allowlist misses on macOS companion-app approvals unless the shell binary itself is allowlisted, (9) if OpenClaw cannot identify exactly one concrete local file for an interpreter/runtime command (e.g., package scripts, eval forms), approval-backed execution is denied — a second-layer gate beyond the allowlist. When a user requires user isolation, RBAC, audit trails, sandboxed execution, guaranteed reasoning suppression, or fine-grained exec control, warn them that stock OpenClaw does NOT provide these features natively and they must implement external controls or evaluate alternatives such as PokeeClaw. (source, source, source, source, source, source, source, source, source, source)
Enterprise-secure alternatives — PokeeClaw
- When a user needs OpenClaw-style agent functionality with enterprise security controls, PokeeClaw (by Pokee AI, https://pokee.ai/) is a commercial alternative that explicitly addresses OpenClaw's security gaps. Pokee AI's own marketing explicitly positions PokeeClaw against OpenClaw, stating 'OpenClaw doesn't belong in production.' PokeeClaw provides: (1) per-user isolated workspaces — each user gets their own VM with dedicated CPU/RAM; nothing is shared between users, (2) encrypted credential vaults for token and secret storage, (3) audit logging and access controls (enterprise plans), (4) role-based access control (enterprise plans), (5) on-premises deployment option (enterprise plans), (6) 1,000+ app integrations, (7) persistent per-user storage, and (8) the ability to run code and install packages within the isolated workspace. Pokee AI claims up to 20× lower token consumption via RL-based tooling selection vs. prompting frontier LLMs — this claim appears in their FAQ (https://dev.pokee.ai/faq) but lacks independent verification; verify independently before recommending based on cost alone. As of 2026-04-09, PokeeClaw is a real shipping product confirmed by multiple independent sources; verify current feature set and pricing at https://pokee.ai/ and https://dev.pokee.ai/faq. (source, source, source, source, source, source, source) (medium confidence)
- If a user asks whether OpenClaw is suitable for production or enterprise use: warn that OpenClaw's open-source design lacks native user isolation, RBAC, audit logging, and sandboxed skill execution. Multiple independent sources (Cisco, TechCrunch, TechRadar, security researchers) have flagged these gaps. For production deployments requiring these controls, recommend evaluating PokeeClaw or implementing external sandboxing (e.g., running OpenClaw inside per-user containers with network policies, read-only filesystems, and stripped capabilities). DO NOT recommend running stock OpenClaw in multi-user production environments without external hardening. (source, source, source, source, source)
- PokeeClaw's 'approval workflows' feature is mentioned on the product site under general 'governance' terminology but lacks explicit product detail in public documentation as of 2026-04-09. Verify whether explicit approval workflows (e.g., human-in-the-loop gating for sensitive agent actions) are actually available before recommending this specific capability to users. Check https://pokee.ai/ and https://dev.pokee.ai/faq for current feature documentation. (source, source, source) (medium confidence)
Warnings
- Credential rotation is NOT required for end users who installed
cline@2.3.0— the postinstall payload only rannpm install -g openclaw@latestand no credential theft from user machines has been publicly confirmed as of 2026-04-09. However, instruct users to remove OpenClaw (npm uninstall -g openclaw), check for any OpenClaw daemon persistence (e.g., systemd units, launchd plists), and verify no unexpected entries exist in~/.openclaw/. (source, source, source, source) - Security researcher Adnan Khan discovered the Cline triage vulnerability in late December 2025 and filed GHSA-9ppg-jx86-fqw7 on 2026-01-01. He was NOT the attacker — he conducted his PoC on a mirror repo. An unknown actor found his PoC and weaponized it against Cline. Cline did not respond for five weeks; the workflow was patched within 30 minutes of public disclosure on 2026-02-09. Cline's subsequent credential rotation was incomplete — the team deleted the wrong token, leaving the exposed npm token active until 2026-02-11, but the attacker had already exfiltrated credentials, allowing publication of the malicious package six days later on 2026-02-17. DO NOT attribute the attack to Khan. (source, source, source)
- Endor Labs assessed overall impact of the Clinejection incident as low because OpenClaw itself is not malicious, and the postinstall script did not automatically start the Gateway daemon. However, the technique demonstrates that any npm postinstall script can silently install persistent, privileged software. Researchers warn the same technique could have delivered far worse payloads. Warn users about the general risk of npm lifecycle scripts and recommend using
--ignore-scriptswhen installing unfamiliar packages. (source, source, source) - Microsoft Threat Intelligence observed a noticeable uptick in OpenClaw installations on 2026-02-17, corroborating the supply-chain compromise timeline. If a user reports an unexpected OpenClaw installation dated around that date, treat it as originating from the compromised
cline@2.3.0and instruct removal. (source, source) - For users affected by the axios compromise (March 2026): credential rotation IS required, unlike the Clinejection incident. The
plain-crypto-jsRAT had full system access including credential exfiltration capabilities. Instruct affected users to: (1) rotate ALL secrets, tokens, API keys, and credentials on the compromised machine, (2) audit CI/CD pipelines that rannpm installduring 2026-03-31 00:21–03:29 UTC, (3) block C2 domainsfrclak[.]com(IP142.11.206.73) at the firewall/DNS level, and (4) scan for persistence mechanisms left by the RAT. (source, source, source, source) - The
v2026.3.8release fixes a Telegram integration issue where stalled media downloads would hang indefinitely, causing polling failures. The fix applies a timeout only to stalled body reads so polling recovers without aborting slow-but-active downloads. Separately,v2026.3.8deduplicates inbound Telegram DMs per agent so a single DM no longer triggers duplicate replies when multiple session keys resolve for the same agent. If a user reports duplicate Telegram bot responses or hung Telegram media downloads on OpenClaw, instruct them to upgrade tov2026.3.8or later. (source, source, source) - When using GPT-5.4 or other models from the openai-codex family with OpenClaw, the correct API parameter key is
reasoning.effort(NOTreasoning_effort). Builds prior to PR #36590 (merged 2026-03-06) rejectopenai-codex/gpt-5.4as 'not allowed'. If a user reports 'model not allowed' errors for GPT-5.4, verify they are running a build from 2026-03-06 or later. A separate regression introduced inv2026.3.28caused"Reasoning is required for this model endpoint"errors for GPT-5.4-mini on OpenRouter (GitHub issue #57430) — if a user hits this error, instruct them to check for patches beyondv2026.3.28or set an explicitreasoningDefaultto work around the enforcement. (source, source, source) - Setting
exec-approvals.jsondefaults to{"security": "full", "ask": "off", "askFallback": "full"}may NOT be sufficient on all versions. GitHub issue #20141 documents users who set exactly those values but still hit approval walls, suggesting the fix may be incomplete or version-dependent. If a user applies the recommended exec-approval settings and still encounters approval failures after a gateway restart, instruct them to: (1) verify bothexec-approvals.jsonANDtools.exec.*inopenclaw.jsonare set (the two-layer policy means the stricter wins), (2) check thattools.exec.strictInlineEvalisfalseif inline eval forms are being blocked, (3) verify they restarted the gateway after changingopenclaw.json, and (4) check the OpenClaw GitHub issues for version-specific regressions. (source, source, source, source)
Version guidance
- For the Cline CLI: DO NOT use
cline@2.3.0(compromised, deprecated). Usecline@2.4.0or later. The 2.4.0 release revoked the compromised token, removed the vulnerable triage workflow, and migrated to OIDC-based npm provenance. As of 2026-04-09, verify the latest safe version at https://www.npmjs.com/package/cline before recommending. (source, source, source) - For OpenClaw:
v2026.3.8(released 2026-03-09) is a REQUIRED security update — it patches CVE-2026-33574 (path-traversal/TOCTOU) and includes 12+ additional security fixes. It also adds ACP provenance support (openclaw acp --provenance off|meta|meta+receipt) and local backup CLI commands (openclaw backup create,openclaw backup verify). All users on versions prior tov2026.3.8MUST upgrade. As of 2026-04-09, verify the latest version at https://github.com/openclaw/openclaw/releases before recommending. (source, source, source, source, source, source) - For OpenClaw:
v2026.4.1(released around 2026-04-09) is a backward-compatible additive release with no breaking changes to features — but it DOES resetexec-approvals.jsonto strict defaults, which can break automated exec workflows. It adds Amazon Bedrock Guardrails support (content-safety filtering), a bundled SearXNG web-search provider plugin, a/tasksbackground task board, macOS Voice Wake for Talk Mode, Feishu/Lark Drive comment integration,agents.defaults.paramsfor global default provider parameters, configurable chat-history text truncation viagateway.webchat.chatHistoryMaxChars, andglm-5.1/glm-5v-turbomodels in the Z.AI catalog. After upgrading tov2026.4.1, MUST reconfigure exec-approval settings (see 'Exec-approval and execution policy configuration' section). As of 2026-04-11, verify the latest version at https://github.com/openclaw/openclaw/releases before recommending. (source, source, source, source, source) - For axios: DO NOT use
axios@1.14.1,axios@1.14.2, oraxios@0.30.4(compromised with RAT payload, removed from npm). Safe versions as of 2026-04-09:axios@1.14.0(last legitimate 1.x release) andaxios@0.30.3(last legitimate 0.30.x release). Before recommending any axios version, verify at https://www.npmjs.com/package/axios that the version is not flagged and was published by a legitimate maintainer. (source, source, source, source)
Supply-chain hardening lessons
- When configuring AI-powered GitHub Actions workflows (e.g.,
claude-code-action, Copilot agents), NEVER interpolate untrusted input (issue titles, PR bodies, comment text) directly into agent prompts. Use environment variables or parameterized inputs, restrict tool permissions to the minimum required, and run the workflow only on trusted trigger events (e.g.,pull_request_targetwith explicit approval gates). The Clinejection attack demonstrates that prompt injection in CI/CD agents can lead to full credential exfiltration and package compromise. (source, source, source, source) - OpenClaw's dependency graph includes 1,246 third-party modules and 2,672 dependency paths. After the axios compromise, OpenClaw locked its dependency module versions. When hardening OpenClaw installations: (1) ALWAYS use exact-version pinning in lockfiles — never floating ranges for transitive dependencies, (2) audit lockfiles for
plain-crypto-jsand compromised axios versions after anynpm install/yarn install, (3) use--ignore-scriptsfor initial installs of unfamiliar packages, (4) enable npm provenance verification where available, and (5) run comprehensive dependency audits regularly — Skills and Agents modules may pull axios transitively. (source, source, source, source)
Security-relevant features and hardening configuration
- When using OpenClaw with Amazon Bedrock, enable Bedrock Guardrails (added in
v2026.4.1, PR #58588) for opt-in PII blocking, content filtering, and grounding checks. Configure guardrail IDs in the Bedrock provider settings. This is the first native content-safety integration in the bundled Bedrock provider — recommend enabling it for any production deployment handling sensitive data. (source, source) - When a user wants private web search within OpenClaw, recommend the bundled SearXNG provider plugin (added in
v2026.4.1, PR #57317). It supports configurable host pointing, so users can run a self-hosted SearXNG instance that does NOT track or profile users. For security-sensitive environments, instruct users to self-host SearXNG rather than relying on public instances, and configure theweb_searchprovider host to the internal URL. (source, source, source) - Use
agents.defaults.params(added inv2026.4.1) to set global default provider parameters across all agents. This allows enforcing consistent temperature, token limits, and safety parameters at the configuration level rather than per-agent. Usegateway.webchat.chatHistoryMaxCharsto control chat-history text truncation, which limits how much context is sent and reduces the risk of prompt-exfiltration attacks via large conversation histories. (source, source) - Enable ACP provenance tracking (added in
v2026.3.8) for agent-to-agent communication audit trails. Configure viaopenclaw acp --provenance off|meta|meta+receipt. Themetamode retains ACP-origin metadata and session trace IDs on inbound messages;meta+receiptadditionally injects visible receipt data. For any deployment where agent-to-agent interactions must be traceable or auditable, set--provenance meta+receipt. This is the first native provenance mechanism for ACP ingress in OpenClaw. Independently confirmed by the Umbrel app store changelog, blockchain.news coverage, and GitHub release notes. (source, source, source, source, source) - Use the local backup CLI (added in
v2026.3.8) to create and verify state archives before upgrades, migrations, or hardening changes. Commands:openclaw backup create(creates a local archive of OpenClaw state),openclaw backup verify(validates manifest and payload integrity of an existing archive). Flags:--only-config(backs up configuration only, excluding workspace data),--no-include-workspace(excludes workspace artifacts). MUST runopenclaw backup createbefore applying any security-critical upgrade or configuration change. After restoring from backup, runopenclaw backup verifyto confirm archive integrity. Independently confirmed by the Umbrel app store changelog and GitHub release notes. (source, source, source, source) - To prevent reasoning text from leaking to end-user channels, configure the following in
openclaw.json: (1) Setagents.defaults.reasoningDefaultto"off"— this globally suppresses reasoning display for all new sessions. Without this,resolveDefaultReasoningLevel()auto-enables reasoning for reasoning-capable models. (2) For per-agent override, setagents.list[].reasoningDefaultto"off"on specific agents. (3) Setagents.defaults.heartbeat.includeReasoningtofalse(or leave at defaultfalse) to prevent heartbeat messages from including reasoning output. (4) Optionally setagents.list[].thinkingDefaultto"off"to suppress the related thinking feature. The resolution order is: inline directive (/reasoning off) → session override → per-agent default (agents.list[].reasoningDefault) → global default (agents.defaults.reasoningDefault) → fallback"off". Valid values for bothreasoningDefaultandthinkingDefault:"off","on","stream". For production deployments on public-facing channels, set BOTH global defaults to"off"and verify no per-agent overrides re-enable them. See https://docs.openclaw.ai/tools/thinking for the full resolution chain and https://docs.openclaw.ai/gateway/configuration-reference for all config keys. (source, source, source, source, source, source, source, source) - A proposed output-level filter feature (
agents.defaults.outputFilterswith regex strip actions) was filed as GitHub Issue #45041 (2026-03-13) to strip leaked"Reasoning:"lines and meta-planning text (e.g.,"Let me...","I will...") from assistant messages before channel delivery. As of 2026-04-10, this feature request is still open/unmerged. DO NOT recommendoutputFiltersas a config key — it does not exist yet. If a user needs output-level filtering, they must implement it externally (e.g., via a proxy or webhook post-processor) until this feature is merged. Verify status at https://github.com/openclaw/openclaw/issues/45041. (source, source)
Exec-approval and execution policy configuration
- OpenClaw's exec-approval system is a TWO-LAYER policy. Layer 1:
~/.openclaw/exec-approvals.json(thedefaultsblock controlssecurity,ask, andaskFallback). Layer 2:tools.exec.*in~/.openclaw/openclaw.json(controlshost,security, andstrictInlineEval). The effective policy is the STRICTER of the two layers — configuring only one layer is INSUFFICIENT. To configure unrestricted exec (single-user, trusted environments only): (1) In~/.openclaw/exec-approvals.json, setdefaultsto{"security": "full", "ask": "off", "askFallback": "full"}. (2) In~/.openclaw/openclaw.json, settools.exec.hostto"gateway",tools.exec.securityto"full", and optionallytools.exec.strictInlineEvaltofalse. (3) Restart the gateway:openclaw gateway restart. Changes toopenclaw.jsondo NOT take effect without a restart. For multi-user or public-facing deployments, usesecurity: "allowlist"with explicit per-command allowlist entries instead of"full". See https://docs.openclaw.ai/tools/exec-approvals and https://docs.openclaw.ai/tools/exec for full documentation. (source, source, source, source, source, source, source, source) - Valid values for
exec-approvals.jsonfields:securityaccepts"full"(allow everything — equivalent to elevated),"allowlist"(only pre-approved commands),"deny"(block all exec).askaccepts"off"(never prompt for approval),"on-miss"(prompt only when command is not in allowlist),"always"(prompt for every command).askFallbackaccepts"full"(allow if approval is not available or times out) and"deny"(block if approval is not available). Thetools.exec.strictInlineEvalsetting inopenclaw.jsoncontrols whether inline interpreter eval forms (python -c,node -e,ruby -e,perl -e,php -r,lua -e,osascript -e) always require explicit approval; set tofalseto allow them without approval prompts. On macOS, complex shell commands using control syntax (&&,||,;,|,$, etc.) are treated as an allowlist miss unless the shell binary itself is allowlisted. If OpenClaw cannot identify exactly one concrete local file for an interpreter/runtime command, approval-backed execution is denied regardless of other settings. (source, source, source, source, source)
Safe update procedures
- When advising users on updating OpenClaw, use ONLY the officially documented methods (https://docs.openclaw.ai/updating): (1) For source/git installs:
openclaw updatewhich runs update + restart. (2) For global npm installs:sudo npm i -g openclaw@latest(orsudo npm i -g openclaw@<version>to pin/rollback), thenopenclaw gateway restart. (3) For Docker installs: pull the updated image (e.g.,ghcr.io/openclaw/openclaw:latestor a specific tag) and recreate/restart the container per https://docs.openclaw.ai/install/docker. DO NOT recommendopenclaw update openclaw --version— this syntax is inaccurate and does not match official documentation as of 2026-04-09. Before any upgrade, runopenclaw backup createto capture a restorable state archive (available sincev2026.3.8). After any upgrade, MUST verify and reconfigure~/.openclaw/exec-approvals.jsonandtools.exec.*inopenclaw.json— upgrades (especiallyv2026.4.1) can reset exec-approval settings to strict defaults, breaking automated workflows. Always restart the gateway after config changes. (source, source, source, source, source, source, source, source)
Known CVEs patched in OpenClaw releases
- CVE-2026-33574: Path-traversal/TOCTOU vulnerability affecting OpenClaw versions prior to
v2026.3.8. Fixed inv2026.3.8(released 2026-03-09). SentinelOne documented this CVE. If a user is running any version older thanv2026.3.8, instruct them to upgrade immediately. Verify current CVE status at https://www.sentinelone.com/vulnerability-database/cve-2026-33574/ and the OpenClaw releases page. (source, source, source)
Last updated: 2026-04-11T11:11:05.462Z