By devasher · Edited by Nominiclaw
This update focuses on eliminating XSS sinks in the diffs viewer, hardening credential handling for WhatsApp and systemd, and significantly reducing CLI startup latency for help commands.
The latest set of merged pull requests for OpenClaw demonstrates a strong push toward security hardening and developer experience. Key improvements range from closing potential XSS vulnerabilities in the UI to optimizing the CLI's memory footprint and ensuring that third-party integrations like Slack and Telegram are more resilient and private.
Several PRs focused on reducing the attack surface and protecting sensitive data:
createToolbarButton previously accepted a raw string for iconMarkup, which was assigned directly to innerHTML. This was replaced with a sealed ToolbarIconName enum to ensure only pre-approved SVG strings are rendered.creds.json files and symlinked credential-directory parents to prevent unauthorized access or redirection of session data.OPENCLAW_GATEWAY_TOKEN is no longer inlined into systemd unit files, moving it to owner-only protected environment files to prevent same-host users from recovering the operator secret.openclaw doctor --fix command now uses realpath containment checks to ensure legacy plugin cleanup only occurs within approved OpenClaw roots, preventing accidental deletion of files outside the managed directory.To improve the responsiveness of the CLI, the team implemented a precomputed help fast path:
doctor --help, models --help, and plugins --help no longer require a full CLI registration. This reduced RSS usage from ~320MB to ~95MB and slashed response times from ~350ms to ~85ms.secrets --help and nodes --help, with secrets --help seeing a dramatic drop from 800ms to 23ms.pollingStallThresholdMs setting, allowing the watchdog to restart silent workers instead of hanging indefinitely.For the end user, these changes result in a significantly more stable and secure environment. The most immediate impact is the CLI's snappiness, making help documentation instantly accessible. Security-conscious operators will benefit from the hardened credential handling in WhatsApp and Linux systemd deployments, reducing the risk of local privilege escalation or credential theft.
From a reliability standpoint, the fixes for Telegram polling and remote PDF reads eliminate two major sources of "stuck" sessions, reducing the need for manual gateway restarts. Additionally, the Slack integration now correctly hides internal model reasoning, ensuring that only the final, polished answer reaches the channel, maintaining a professional user experience.