| ▲ | steipete 3 hours ago | |
OpenClaw creator here. This was a privilege-escalation bug, but not "any random Telegram/Discord message can instantly own every OpenClaw instance." The root issue was an incomplete fix. The earlier advisory hardened the gateway RPC path for device approvals by passing the caller's scopes into the core approval check. But the `/pair approve` plugin command path still called the same approval function without `callerScopes`, and the core logic failed open when that parameter was missing. So the strongest confirmed exploit path was: a client that ALREADY HAD GATEWAY ACCESS and enough permission to send commands could use `chat.send` with `/pair approve latest` to approve a pending device request asking for broader scopes, including `operator.admin`. In other words: a scope-ceiling bypass from pairing/write-level access to admin. This was not primarily a Telegram-specific or message-provider-specific bug. The bug lived in the shared plugin command handler, so any already-authorized command sender that could reach `/pair approve` could hit it. For Telegram specifically, the default DM policy blocks unknown outsiders before command execution, so this was not "message the bot once and get admin." But an already-authorized Telegram sender could still reach the vulnerable path. The practical risk for this was very low, especially if OpenClaw is used as single-user personal assistant. We're working hard to harden the codebase with folks from Nvidia, ByteDance, Tencent and OpenAI. | ||
| ▲ | nightpool 2 hours ago | parent | next [-] | |
Can you speak a little bit more to the stats in the OP? * 135k+ OpenClaw instances are publicly exposed * 63% of those run zero authentication. Meaning the "low privilege required" in the CVE = literally anyone on the internet can request pairing access and start the exploit chain Is this accurate? This is definitely a very different picture then the one you paint | ||
| ▲ | rossjudson an hour ago | parent | prev | next [-] | |
With respect...Security through obscurity is dead. We are approaching the point where only formally verified (for security) systems can be trusted. Every possible attack will be attempted. Every opening will be exploited, and every useful combination of those exploits will be done. LLMs are patient, tireless, capable of rigorous opsec, and effectively infinite in number. | ||
| ▲ | rybosome an hour ago | parent | prev | next [-] | |
According to this[1] your statement that practical risk was low is not accurate.
If that's accurate, then this statement:
...is only true for the 37% of authenticated OpenClaw instances.I'm sure it's extremely stressful and embarrassing to face the prospect that your work created a widespread, significant vulnerability. As another software engineer and a human I empathize with the discomfort of that position. But respectfully, you should put your energy into addressing this and communicating honestly about what happened and the severity, not in attempting to save face and PR damage control. You will be remembered much better for the former. EDIT: more from the source[2]
[1]: https://blink.new/blog/cve-2026-33579-openclaw-privilege-esc...
[2]: https://blink.new/blog/cve-2026-33579-openclaw-privilege-esc... | ||
| ▲ | sbochins 26 minutes ago | parent | prev | next [-] | |
I guess this is the era of no shame. I know people should realize this project is inherently insecure and that it’s likely you will get hacked if you use it. But why is the creator not even taking any accountability whatsoever —- especially after all the bragging he’s done about shipping fast and not reading any of the code his agents generate? | ||
| ▲ | LucidLynx an hour ago | parent | prev | next [-] | |
About time to read the code you ship now... | ||
| ▲ | just_once an hour ago | parent | prev | next [-] | |
Nvidia, ByteDance, Tencent and OpenAI?! Wow! | ||
| ▲ | hmokiguess an hour ago | parent | prev | next [-] | |
Who are you replying to? The tone of your message seems to indicate you want to address some misinformation, but that isn't found here or in OP's link. Did OpenClaw write this for you? | ||
| ▲ | popalchemist 2 hours ago | parent | prev | next [-] | |
The level of seriousness of your attitude here is not commensurate to the blatant security problem you are creating in the world. | ||
| ▲ | mvdtnz 2 hours ago | parent | prev [-] | |
What does Telegram/Discord have to do with anything? The OP never mentioned either of these software suites. In fact the only mention of Telegram anywhere in the entire thread is you copy-pasting this exact message. | ||