OpenClaw: Skill env override host env injection via applySkillConfigEnvOverrides (defense-in-depth)
Moderate severity
GitHub Reviewed
Published
Feb 21, 2026
in
openclaw/openclaw
•
Updated Mar 12, 2026
Description
Published to the GitHub Advisory Database
Feb 27, 2026
Reviewed
Feb 27, 2026
Last updated
Mar 12, 2026
Summary
applySkillConfigEnvOverridespreviously copiedskills.entries.*.envvalues into the hostprocess.envwithout applying the host env safety policy.Impact
In affected versions, dangerous process-level variables such as
NODE_OPTIONScould be injected when unset, which can influence runtime/child-process behavior.Required attacker capability
An attacker must be able to modify OpenClaw local state/config (for example
~/.openclaw/openclaw.json) to setskills.entries.<skill>.envor related skill config values.Remediation
Fixed in
2026.2.21by sanitizing skill env overrides and blocking dangerous host env keys (includingNODE_OPTIONS) before applying overrides, with regression tests covering blocked dangerous keys.Fix Commit(s)
8c9f35cdb51692b650ddf05b259ccdd75cc9a83cFound using MCPwner
References