Summary
OpenShell mirror mode can convert untrusted sandbox files into explicitly enabled workspace hooks and execute them on the host during gateway startup
Current Maintainer Triage
- Status: narrow
- Normalized severity: medium
- Assessment: Real on shipped <=2026.3.22 OpenShell mirror sync, but exploit needs mirror mode plus hooks enabled plus explicit hook opt-in plus restart, so high is overstated even though the direct fix shipped in v2026.3.28.
Affected Packages / Versions
- Package:
openclaw (npm)
- Latest published npm version:
2026.3.31
- Vulnerable version range:
<=2026.3.24
- Patched versions:
>= 2026.3.28
- First stable tag containing the fix:
v2026.3.28
Fix Commit(s)
c02ee8a3a4cb390b23afdf21317aa8b2096854d1 — 2026-03-25T19:59:07Z
Release Process Note
- The fix is already present in released version
2026.3.28.
- This draft looks ready for final maintainer disposition or publication, not additional code-fix work.
Thanks @tdjackey for reporting.
References
Summary
OpenShell
mirrormode can convert untrusted sandbox files into explicitly enabled workspace hooks and execute them on the host during gateway startupCurrent Maintainer Triage
Affected Packages / Versions
openclaw(npm)2026.3.31<=2026.3.24>= 2026.3.28v2026.3.28Fix Commit(s)
c02ee8a3a4cb390b23afdf21317aa8b2096854d1— 2026-03-25T19:59:07ZRelease Process Note
2026.3.28.Thanks @tdjackey for reporting.
References