Summary
config.get redaction bypass through sourceConfig and runtimeConfig aliases.
Affected Packages / Versions
- Package:
openclaw
- Ecosystem: npm
- Affected versions:
< 2026.4.14
- Patched versions:
>= 2026.4.14
Impact
An authenticated gateway client with config read access could receive unredacted secrets through alias fields that survived redaction, including provider API keys, gateway auth material, and channel credentials.
Technical Details
The fix explicitly overwrites sourceConfig and runtimeConfig with the same redacted copies used for resolved and config, including the invalid-snapshot branch. Tests now cover both alias fields.
Fix
The issue was fixed in #66030. The first stable tag containing the fix is v2026.4.14, and openclaw@2026.4.14 includes the fix.
Fix Commit(s)
86734ef93a2f25063371b04f1946eb300548acd4
- PR: #66030
Release Process Note
Users should upgrade to openclaw 2026.4.14 or newer. The latest npm release, 2026.4.14, already includes the fix.
Credits
Thanks to @zsxsoft, with sponsorship from @KeenSecurityLab and @qclawer for reporting this issue.
References
Summary
config.get redaction bypass through sourceConfig and runtimeConfig aliases.
Affected Packages / Versions
openclaw< 2026.4.14>= 2026.4.14Impact
An authenticated gateway client with config read access could receive unredacted secrets through alias fields that survived redaction, including provider API keys, gateway auth material, and channel credentials.
Technical Details
The fix explicitly overwrites
sourceConfigandruntimeConfigwith the same redacted copies used forresolvedandconfig, including the invalid-snapshot branch. Tests now cover both alias fields.Fix
The issue was fixed in #66030. The first stable tag containing the fix is
v2026.4.14, andopenclaw@2026.4.14includes the fix.Fix Commit(s)
86734ef93a2f25063371b04f1946eb300548acd4Release Process Note
Users should upgrade to
openclaw2026.4.14 or newer. The latest npm release,2026.4.14, already includes the fix.Credits
Thanks to @zsxsoft, with sponsorship from @KeenSecurityLab and @qclawer for reporting this issue.
References