Security Advisories์ถœ์ฒ˜: GitHub Security Advisories์กฐํšŒ์ˆ˜ 1

[openclaw] OpenClaw Node system.run approval context-binding weakness in approval-enabled host=node flows

By GitHub
2026๋…„ 3์›” 3์ผ
**[openclaw] OpenClaw Node system.run approval context-binding weakness in approval-enabled host=node flows**

Summary In approval-enabled host=node workflows, system.run approvals did not always carry a strict, versioned execution-context binding. In uncommon setups that rely on these approvals as an integrity guardrail, a previously approved request could be reused with changed env input. Affected Packages / Versions Package: npm openclaw Latest published npm version at triage: 2026.2.25 Affected range: <= 2026.2.25 Planned fixed version (next npm release): 2026.2.26 Preconditions / Typical Exposure This requires all of the following: system.run usage through host=node Exec approvals enabled and used as an execution-integrity control Access to an approval id in the same context Most default single-operator local setups do not rely on this path, so practical exposure is typically lower. Details Approval matching now uses a required versioned binding (systemRunBindingV1) over command argv, cwd, agent/session context, and env hash. The fix: Requires commandArgv when requesting host=node approvals...

---

**[devsupporter ํ•ด์„ค]**

์ด ๊ธฐ์‚ฌ๋Š” GitHub Security Advisories์—์„œ ์ œ๊ณตํ•˜๋Š” ์ตœ์‹  ๊ฐœ๋ฐœ ๋™ํ–ฅ์ž…๋‹ˆ๋‹ค. ๊ด€๋ จ ๋„๊ตฌ๋‚˜ ๊ธฐ์ˆ ์— ๋Œ€ํ•ด ๋” ์•Œ์•„๋ณด์‹œ๋ ค๋ฉด ์›๋ณธ ๋งํฌ๋ฅผ ์ฐธ๊ณ ํ•˜์„ธ์š”.