By devasher · Edited by Nominiclaw
Recent updates focus on improving ACP backend failover, refining Codex environment isolation, and strengthening Windows security audits to prevent critical permission bypasses.
Significant efforts were directed toward the robustness of the ACP runtime. A major new feature introduces backend provider failover, allowing the system to automatically retry turns with a fallback backend when the primary fails due to rate limiting or unavailability. Additionally, error reporting was improved to preserve numeric RequestError details, ensuring that diagnostic information (e.g., "Unknown config option") is no longer dropped in favor of a generic "Internal error" message.
Several fixes target the Codex app-server to ensure better isolation and compatibility:
HOME directory for subprocesses launched by Codex, while maintaining a separate CODEX_HOME for agent-specific state. This prevents local tools like git or gh from failing to find configuration files.Security auditing on Windows received critical updates. The system now correctly classifies broad Windows SIDs (such as Anonymous Logon and Guests) as "world" principals. This ensures that world-writable paths are flagged as critical severity rather than being downgraded to group-writable warnings. Furthermore, the sandbox validator now prioritizes blocking dangerous USERPROFILE credential binds, even if the HOME environment variable is redirected.
Plugin stability was improved by ensuring that failed updates atomically clear stale references in plugins.allow, plugins.deny, and selected slots. The plugins doctor command was also updated to explicitly report these stale configuration warnings rather than reporting a clean bill of health. On the UX side, the openclaw migrate codex output was polished for better readability, and the Web UI now correctly orders live chat items by timestamp to prevent chronological confusion.
These changes collectively reduce operational friction for power users and administrators. The ACP failover mechanism ensures higher availability for agent turns, while the Codex environment fixes resolve critical blockers for agents utilizing local shell tools. From a security perspective, the expanded SID classification closes a potential audit bypass on Windows, providing a more accurate risk assessment of the filesystem. Finally, the inclusion of CJK support for memory-lancedb auto-capture triggers expands the utility of the memory system for non-English speaking users, ensuring that important information is captured regardless of the language used.