OpenClaw 2026.2.12 Update Boosts Security with 40+ Fixes, Reinforces Defense Against RCE and Vulnerability Threats

OpenClaw 2026.2.12: Comprehensive Security Overhaul with 40+ Vulnerability Fixes

OpenClaw has unveiled its latest update, version 2026.2.12, marking a significant stride in bolstering the security framework of its AI agent platform. This release addresses over 40 vulnerabilities and introduces enhancements across various components, including hooks, browser control, scheduling, messaging channels, and gateway security.

Emphasis on Defense-in-Depth

In response to escalating concerns over exposed OpenClaw agents, token-stealing remote code execution (RCE) chains, and unsafe default deployments, this update prioritizes a defense-in-depth strategy. A notable enhancement is the implementation of a strict Server-Side Request Forgery (SSRF) deny policy for URL-based input_file and input_image requests within the Gateway and OpenResponses. This policy encompasses hostname allowlists, per-request URL limits, and audit logging for blocked fetch attempts, significantly mitigating the risk of attackers exploiting agents to scan or probe internal networks.

Sanitization of Untrusted Data

To counteract prompt-injection attacks, outputs from browser and web tools are now treated as untrusted data. These outputs are encapsulated in structured metadata and sanitized before being processed by the model, thereby reducing potential vulnerabilities.

Enhanced Security for Hooks and Webhooks

The update introduces substantial hardening measures for hooks and webhooks. Secret comparisons now utilize constant-time checks to prevent timing attacks, and per-client rate limiting (HTTP 429 with Retry-After) has been implemented to deter brute-force attempts. By default, the POST /hooks/agent endpoint now blocks payload sessionKey overrides, requiring operators to configure safe prefixes or manually re-enable legacy behavior if necessary.

Key Features Across Components

The 2026.2.12 release brings a suite of key features across various components:

– Core Platform Security: Addresses over 40 vulnerabilities, reinforcing the platform’s overall security posture.

– Gateway SSRF Protection: Enforces strict URL allowlists, sets per-request limits, and implements audit logging to prevent unauthorized internal network access.

– Model Pipeline Prompt Injection Defense: Ensures that outputs from browsers and tools are sanitized before model processing, reducing the risk of prompt-injection attacks.

– Hooks/Webhooks Security: Introduces constant-time secret checks and rate limiting to enhance security against brute-force attacks.

– Browser Control Authentication: Mandates authentication for loopback browser control to prevent unauthorized access.

– Scheduler (Cron) Fixes: Addresses issues related to skipped or duplicate jobs, ensuring reliable scheduling.

– Gateway Updates: Improves safe restart handling and supports larger WebSocket connections.

– Messaging Channels Improvements: Enhances integrations with platforms like Telegram, WhatsApp, Slack, Signal, and Discord for safer and more efficient messaging.

– Release Integrity: Provides signed Mac packages with SHA-256 verification to ensure the authenticity and integrity of releases.

Addressing Previous Vulnerabilities

This update also rectifies issues such as unauthenticated tampering with remote Nostr profile configurations, the removal of a risky hook, restriction of mirrored skill sync to a sandboxed directory, and tightened transcript path validation to block unsafe file access.

Mandatory Authentication for Browser Control

In light of previous vulnerabilities linked to one-click RCE and token leaks, loopback browser control now requires mandatory authentication. If no credentials are set, OpenClaw automatically generates a secure gateway token. New audit checks have been introduced to flag unauthenticated browser control routes, directly addressing instances where exposed OpenClaw instances allowed full RCE and credential theft.

Reliability Enhancements

The 2026.2.12 release includes significant reliability improvements:

– Cron Scheduler Enhancements: Patches have been applied to prevent skipped jobs, duplicate triggers, and restart-related issues. Timers now re-arm correctly, and a failing job no longer obstructs others.

– Gateway Updates: Ensures active sessions drain safely before restart, preventing message loss. WebSocket limits now support images up to 5 MB.

– Authentication Tokens: Installations now auto-generate authentication tokens and reject missing or undefined tokens, enhancing security.

– Logging Improvements: Enhances logging capabilities, particularly benefiting macOS deployments.

Ecosystem Updates

The broader OpenClaw ecosystem has also received updates:

– Telegram: Safer message handling and improved formatting.

– WhatsApp: Enhanced Markdown support and improved media handling.

– Slack: Improved reply handling and bot mention detection.

– Signal: Stronger validation and better mention rendering.

– Discord: Improved direct message reactions and thread management.

– Mac Releases: Signed packages with SHA-256 checksum verification to ensure release integrity.

Conclusion

In the current landscape of exposed AI agents and RCE risks, OpenClaw 2026.2.12 establishes a critical security baseline. Operators are strongly encouraged to deploy this update promptly to safeguard their systems against potential threats.