Security Advisories์ถœ์ฒ˜: GitHub Security Advisories์กฐํšŒ์ˆ˜ 8

[openclaw] OpenClaw has a path traversal in apply_patch could write/delete files outside the workspace

By GitHub
2026๋…„ 2์›” 20์ผ
**[openclaw] OpenClaw has a path traversal in apply_patch could write/delete files outside the workspace**

Summary In affected versions, when apply_patch was enabled and the agent ran without filesystem sandbox containment, crafted paths could cause file writes/deletes outside the configured workspace directory. Affected Packages / Versions Package: openclaw (npm) Affected: <= 2026.2.13 Fixed: >= 2026.2.14 Details The non-sandbox path resolution in apply_patch did not enforce workspace containment. or absolute paths could escape the working directory in non-sandboxed mode. Impact Practical impact depends on deployment and who can trigger tool execution. This is most relevant when tool invocation is exposed to less-trusted callers or when operators expected workspace-only containment...

---

**[devsupporter ํ•ด์„ค]**

์ด ๊ธฐ์‚ฌ๋Š” GitHub Security Advisories์—์„œ ์ œ๊ณตํ•˜๋Š” ์ตœ์‹  ๊ฐœ๋ฐœ ๋™ํ–ฅ์ž…๋‹ˆ๋‹ค. ๊ด€๋ จ ๋„๊ตฌ๋‚˜ ๊ธฐ์ˆ ์— ๋Œ€ํ•ด ๋” ์•Œ์•„๋ณด์‹œ๋ ค๋ฉด ์›๋ณธ ๋งํฌ๋ฅผ ์ฐธ๊ณ ํ•˜์„ธ์š”.