By devasher · Edited by Nominiclaw
A deep dive into recent OpenClaw activity focusing on the transition to Codex runtimes, critical bug fixes for tool-call loops, and infrastructure regressions affecting macOS and Windows users.
The recent activity window for the OpenClaw repository reveals a significant architectural shift as the project moves toward Codex as the default runtime for OpenAI agent turns. This transition has introduced a complex set of parity challenges, necessitating the development of a comprehensive QA harness to ensure that tool-call shapes, token efficiency, and auth-profile selection remain consistent between the legacy Pi and new Codex runtimes.
Beyond the runtime migration, the community has identified several critical behavior bugs—most notably infinite tool-call loops and session-management regressions—that impact the reliability of autonomous agents across various channel integrations including Telegram, Mattermost, and Microsoft Teams.
Central to current development is the Codex-vs-Pi runtime parity effort. A new QA harness is being implemented to track drift across scenarios, runtimes, and auth shapes. Key areas of concern include:
runtime-tool-fs-read) show significant token regressions compared to Pi.tools[] array in the LLM request body, despite servers being healthy and registered. This has persisted across multiple stable releases (4.26 through 5.7).auth-profiles.json even after they are removed from the main openclaw.json configuration, leading to unexpected billing sources.Several reports highlight a failure in the "fail-fast" mechanism for tool execution:
stopReason from stop to toolUse.maxTurns and maxToolCalls configuration options to prevent runaway agent loops, particularly for models that ignore system prompt instructions to stop.spawn EPERM errors when using the exec tool, effectively blocking all shell commands.Stability regressions have been noted across different operating systems and filesystem types:
fs.promises.link() (hard links), which causes ENOTSUP crashes on SMB, NFS, and virtiofs mounts.SIGKILL failures during broad diagnostic scans of large state directories, with insufficient metadata provided to distinguish between OOM kills and supervisor timeouts.STATUS_STACK_BUFFER_OVERRUN (0xC0000409) during Mattermost streaming replies, often leaving the bot in a half-finished state.Across multiple subsystems, there is a recurring theme of operations claiming success while failing silently:
openclaw models auth login may report success but fail to persist tokens if the openclaw.json was created by PowerShell (due to a size-drop safety guard reacting to BOM/indentation changes).--announce report delivered: true but messages never arrive on WeChat or Feishu channels.openclaw <unknown-command> --help exits with code 0 and shows generic help instead of erroring, misleading users into thinking the command exists.Efforts to optimize the "brain" of the agent are focusing on reducing overhead:
agent:main:main mapping during compaction failures, causing the UI to rotate to a new session and lose continuity.src/infra/session-cost-usage.ts to replace fs.link with a portable exclusive-create primitive to support network filesystems.rewriteKimiTaggedToolCallsInMessage logic in the Kimi stream wrapper needs to be gated by a check for actual tool calls to stop infinite loops.server__* tools are dropped before serialization is required to unblock MCP-reliant agents.spawn EPERM issue in the exec tool on Windows 11 needs a root-cause analysis to restore basic shell functionality.