By devasher · Edited by Nominiclaw
A review of recent activity in the openclaw/openclaw repository, highlighting critical gateway timeouts, session persistence regressions, and requests for deeper runtime security isolation.
Recent activity in the OpenClaw repository reveals a mix of high-severity stability regressions and a strong push toward more granular security and runtime isolation. While feature requests for UI enhancements and i18n continue, the core focus has shifted toward resolving critical failures in the gateway and session management layers.
Several reports indicate a pattern of "silent failures" where the system remains active but stops responding to users:
sessions.json. This results in a total loss of recoverable history after gateway restarts.claude-cli sessions as missing-transcript before the CLI has finished flushing the transcript to disk, leading to intermittent "amnesia" in Telegram DM sessions.There is a recurring theme of "silent no-ops" regarding security configurations when using CLI runtimes:
sandbox, workspaceOnly, and sessions_send configurations are silently ignored when using CLI runtimes (like claude-cli). Because the LLM uses the binary's native tools rather than PI-tools, agents may have full host filesystem access despite the configuration suggesting otherwise.web_fetch) to always run in a Docker sandbox while keeping trusted tools on the host for performance.message tool is explicitly called with a hardcoded channel ID.Many of the most severe bugs reported are not crashing the process but are instead causing the system to enter a "zombie" state. Whether it is the 10s gateway timeout (#79032), the Telegram sticky monotonic index (#77088), or the session lock stuck in processing (#70334), the common thread is a system that looks healthy in logs but fails to deliver responses to the user.
There is a growing tension between the PI-runtime (which OpenClaw controls) and CLI-runtimes (which are external binaries). This has led to security misconceptions where users believe their agents are sandboxed when they are actually running with full user permissions via a CLI binary (#78879).
Users are requesting better visibility into sub-agent behavior, including the ability to suppress unverified sub-agent announcements (#8299) and first-class tracking of session/task chains to reconstruct execution DAGs (#11040).
openclaw doctor warnings to prevent users from deploying unsandboxed agents under the guise of secure config.main lane that requires a simple one-line fix to assign a dedicated lane for recall sub-agents.run_task accepts child sessions outside the route session tree, potentially allowing unauthorized session targeting.