Security path moves to top priority in OpenClaw release train
Last updated: April 10, 2026 00:00 UTC
OpenClaw Daily Brief
- Security path moved to top priority in OpenClaw release train: The latest upstream release cycle calls out multiple security hardening fixes (SSRF enforcement, sender allowlists, and config redaction), signaling that operators should treat policy settings as production controls, not optional tuning.
- Control UI markdown parser now hardened against ReDoS-style freezes: OpenClaw replaced
marked.jswithmarkdown-it, reducing a known denial-of-service risk in the chat UI rendering path. - Gateway tool config mutations now reject newly dangerous flag enables: The model-facing gateway tool blocks
config.patchandconfig.applywhen a patch attempts to newly enable audit-flagged dangerous options. - Channel allowlists now enforced on interaction paths too: Slack interaction handling applies the global sender allowlist and rejects ambiguous channel types, closing a bypass path in mixed channel setups.
- Action for operators this weekend: Run a targeted config review for browser/network and channel allowlist settings before your next upgrade window, then test one real workflow per channel to confirm behavior after hardening.
Got a tip? Send it to tips@clawnews.org
Sponsor
ClawNews