Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: openclaw

Found 53 matching suggestions

Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw 2026.1.20 < 2026.2.1 - Missing Authentication in Browser Relay /cdp WebSocket Endpoint

OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Browser Relay (extension must be installed and enabled) /cdp WebSocket endpoint in which it does not require authentication tokens, allowing websites to connect via loopback and access sensitive data. Attackers can exploit this by connecting to ws://127.0.0.1:18792/cdp to steal session cookies and execute JavaScript in other browser tabs.

Affected products

OpenClaw
  • <2026.2.1

Matching in nixpkgs

Package maintainers

Unaffected, since we never had 2026.2.1 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.14 - Denial of Service via Unguarded Archive Extraction in extractArchive

OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR archives. Remote attackers can trigger resource exhaustion by providing maliciously crafted archive files during install or update operations, causing service degradation or system unavailability.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, since we never had 2026.2.14 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist

OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, since we never had 2026.2.14 or older.