OpenClaw beta fixes node impersonation via injected system commands
A compromised remote node could impersonate an OpenClaw agent by injecting trusted System: content into the agent turn — a silent privilege escalation buried in last week’s changelog that matters for any team running multi-node deployments.

image from source:github.com
OpenClaw's v2026.4.9-beta.1 patches a critical trust boundary reuse flaw where compromised remote nodes could inject fake System: directives into agent turns by exploiting trusted event handling for exec.started/exec.finished/exec.denied events. The same structural vulnerability class affected the SSRF quarantine bypass (PR #63226), where interaction-driven navigation could reach forbidden URLs after initial allowlist validation had passed. Both issues stem from trust established in one execution context being inappropriately reapplied in a later context where conditions had changed.
- •Remote node exec events were treated as trusted system events without sanitization, allowing injection of System: directives that the agent executed as self-generated instructions
- •The fix downgrades exec.started/exec.finished/exec.denied events to untrusted status and scrubs all node-provided text before enqueueing into the agent turn
- •This vulnerability class—trust boundary reuse failure—also applies to the SSRF quarantine bypass patched in the same release, where navigation could bypass allowlists after the initial check

