feat(kiloclaw): bump openclaw to version 2026.3.12#1082
Open
kilo-code-bot[bot] wants to merge 1 commit intomainfrom
Open
feat(kiloclaw): bump openclaw to version 2026.3.12#1082kilo-code-bot[bot] wants to merge 1 commit intomainfrom
kilo-code-bot[bot] wants to merge 1 commit intomainfrom
Conversation
Contributor
Author
Code Review SummaryStatus: No Issues Found | Recommendation: Merge Files Reviewed (1 files)
Reviewed by gpt-5.4-20260305 · 52,158 tokens |
eebe987 to
24f0fed
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Bumps the pinned OpenClaw version in
kiloclaw/Dockerfilefrom2026.3.8to2026.3.12.Verification
2026.3.8) is older than the target (2026.3.12), so the bump is warranted.v2026.3.12.Visual Changes
N/A
Reviewer Notes
The following items from the
v2026.3.12release notes may be relevant to our deployment:Security fixes (multiple CVEs patched — recommend prompt rollout)
GHSA-99qw-6mr3-36qr— Implicit workspace plugin auto-load disabled: Cloned repositories can no longer execute workspace plugin code without an explicit trust decision. Relevant because user workspaces are mounted from Fly Volumes.GHSA-pcqg-f7rg-xfvv— Exec approval Unicode spoofing: Invisible Unicode format characters in approval prompts now render as visible\u{...}escapes, preventing command-spoofing.GHSA-9r3v-37xh-2cf6— Exec detection Unicode bypass: Normalizes compatibility Unicode and strips invisible code points before obfuscation checks.GHSA-f8r2-vg7x-gh8m— Exec allowlist over-matching: Fixes POSIX case sensitivity and?path-segment scope so allowlist patterns no longer overmatch.GHSA-r7vr-gr74-94p8—/configand/debugsender-ownership enforcement: Non-owner authorized senders can no longer access owner-only config/debug surfaces.GHSA-rqpp-rjj8-7wv8— Gateway shared-token scope elevation: Device-less shared-token operators can no longer self-declare elevated scopes on WebSocket connect.GHSA-vmhq-cqm9-6p7q— Browser profile persistence viabrowser.request: Blocks persistent browser profile admin routes from write-scopedbrowser.request.GHSA-2rqg-gjgv-84jm— Agent workspace boundary bypass: Rejects public spawned-run lineage fields so externalagentcallers cannot override the gateway workspace boundary.GHSA-wcxr-59v9-rxr8—session_statussandbox visibility: Sandboxed subagents can no longer inspect parent session metadata or write parent model overrides.GHSA-2pwv-x786-56f8— Device token scope cap: Stale or overbroad tokens are capped to each device's approved scope baseline.GHSA-jv4g-m82p-2j93/GHSA-xwx2-ppv2-wx98— WebSocket pre-auth hardening: Shortens unauthenticated handshake retention and rejects oversized pre-auth frames.GHSA-6rph-mmhp-h7h9— Proxy attachment size cap: Restores the 5 MB media-store size cap for browser proxy files.GHSA-jf5v-pqgw-gm5m—GIT_EXEC_PATHhost env leak: Blocks inheritedGIT_EXEC_PATHin sanitized host exec environments.GHSA-57jw-9722-6rf2/GHSA-jvqh-rfmh-jh27/GHSA-x7pp-23xv-mmr4/GHSA-jc5j-vg4r-j5jx— Exec approval shell-payload bypass: Fails closed for ambiguous inline loader and shell-payload script execution, and unwrapspnpm/npm exec/npxrunners before approval binding.Device pairing change (note for
start-openclaw.sh/ gateway config)/pairandopenclaw qr: Setup codes now use short-lived bootstrap tokens. The next release will stop embedding shared gateway credentials in chat or QR pairing payloads. This is a behaviour change in the pairing flow — worth verifying ourstart-openclaw.shpairing configuration is compatible.Subagent behaviour change
sessions_yield: Orchestrators can now end a turn immediately and carry a hidden follow-up payload into the next session turn. No action required, but worth being aware of for debugging agent flows.