Summary
Sandboxed agents could escape exec routing via host=node override.
Affected Packages / Versions
- Package:
openclaw
- Ecosystem: npm
- Affected versions:
>= 2026.4.5 < 2026.4.10
- Patched versions:
>= 2026.4.10
Impact
A sandboxed agent could request host: "node" and route exec to a remote node instead of the intended sandbox execution path, bypassing the sandbox routing boundary.
Technical Details
The fix blocks sandboxed exec escape to remote node targets and keeps routing aligned with the active sandbox policy.
Fix
The issue was fixed in #63880. The first stable tag containing the fix is v2026.4.10, and openclaw@2026.4.14 includes the fix.
Fix Commit(s)
dffad08529202edbf34e4808788e1182fe10f6a9
- PR: #63880
Release Process Note
Users should upgrade to openclaw 2026.4.10 or newer. The latest npm release, 2026.4.14, already includes the fix.
Credits
Thanks to @zsxsoft, with sponsorship from @KeenSecurityLab and @qclawer for reporting this issue.
References
Summary
Sandboxed agents could escape exec routing via host=node override.
Affected Packages / Versions
openclaw>= 2026.4.5 < 2026.4.10>= 2026.4.10Impact
A sandboxed agent could request
host: "node"and route exec to a remote node instead of the intended sandbox execution path, bypassing the sandbox routing boundary.Technical Details
The fix blocks sandboxed exec escape to remote node targets and keeps routing aligned with the active sandbox policy.
Fix
The issue was fixed in #63880. The first stable tag containing the fix is
v2026.4.10, andopenclaw@2026.4.14includes the fix.Fix Commit(s)
dffad08529202edbf34e4808788e1182fe10f6a9Release Process Note
Users should upgrade to
openclaw2026.4.10 or newer. The latest npm release,2026.4.14, already includes the fix.Credits
Thanks to @zsxsoft, with sponsorship from @KeenSecurityLab and @qclawer for reporting this issue.
References