OpenClaw: Workspace dotenv could override runtime-control environment variables
Moderate severity
GitHub Reviewed
Published
Apr 21, 2026
in
openclaw/openclaw
•
Updated Apr 25, 2026
Description
Published to the GitHub Advisory Database
Apr 25, 2026
Reviewed
Apr 25, 2026
Last updated
Apr 25, 2026
Affected Packages / Versions
openclaw(npm)< 2026.4.202026.4.20Impact
Workspace
.envloading did not reserve theOPENCLAW_runtime-control namespace broadly enough. A malicious workspace could set variables such asOPENCLAW_GIT_DIRbefore source-update or installer flows, potentially steering trusted OpenClaw runtime behavior.This requires running OpenClaw from an attacker-controlled workspace. Severity is medium.
Fix
OpenClaw now reserves the workspace
OPENCLAW_environment namespace and rejects workspace dotenv entries for OpenClaw runtime-control variables.Fix commit:
018494fa3ebb9145112e68b56fe1cb2e9f9a9ed6Release
Fixed in OpenClaw
2026.4.20.References