Summary
system.run environment sanitization allowed shell-startup env overrides (HOME, ZDOTDIR) that can execute attacker-controlled startup files before allowlist-evaluated command bodies.
Affected Packages / Versions
- Package:
openclaw (npm)
- Affected:
<= 2026.2.21-2 (latest published vulnerable version)
- Planned patched version:
>= 2026.2.22
Technical Details
In affected versions:
- Env sanitization blocked many dangerous keys, but not startup-sensitive override keys (
HOME, ZDOTDIR) in host exec env paths.
- Shell-wrapper analysis for allowlist mode models command bodies, but not shell startup side effects.
- Runtime execution used sanitized env, so attacker-provided startup-key overrides could run hidden startup payloads first.
Observed exploit vectors:
HOME + bash -lc + malicious .bash_profile
ZDOTDIR + zsh -c + malicious .zshenv
Fix Commit(s)
c2c7114ed39a547ab6276e1e933029b9530ee906
Release Process Note
patched_versions is pre-set to the planned next release (>= 2026.2.22). After the npm release is published, this advisory can be published directly.
OpenClaw thanks @tdjackey for reporting.
References
Summary
system.runenvironment sanitization allowed shell-startup env overrides (HOME,ZDOTDIR) that can execute attacker-controlled startup files before allowlist-evaluated command bodies.Affected Packages / Versions
openclaw(npm)<= 2026.2.21-2(latest published vulnerable version)>= 2026.2.22Technical Details
In affected versions:
HOME,ZDOTDIR) in host exec env paths.Observed exploit vectors:
HOME+bash -lc+ malicious.bash_profileZDOTDIR+zsh -c+ malicious.zshenvFix Commit(s)
c2c7114ed39a547ab6276e1e933029b9530ee906Release Process Note
patched_versionsis pre-set to the planned next release (>= 2026.2.22). After the npm release is published, this advisory can be published directly.OpenClaw thanks @tdjackey for reporting.
References