by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt dismissed
OpenClaw < 2026.2.12 - Timing Attack in Hooks Token Authentication
OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually determine the authentication token.
References
-
GitHub Security Advisory (GHSA-jmm5-fvh5-gf4p) vendor-advisory
-
Patch Commit patch
Affected products
- <2026.2.12
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>