Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/CyberSecurity News/OpenClaw 2026.2.12 Released With Fix for 40+ Security Issues
CyberSecurity News

OpenClaw 2026.2.12 Released With Fix for 40+ Security Issues

OpenClaw 2026.2.12 delivers a significant security update, addressing over 40 vulnerabilities and enhancing protection across its AI agent platform. Improvements span hooks, browser control,...

Emy Elsamnoudy
Emy Elsamnoudy
February 13, 2026 2 Min Read
0 0

OpenClaw 2026.2.12 delivers a significant security update, addressing over 40 vulnerabilities and enhancing protection across its AI agent platform. Improvements span hooks, browser control, scheduling, messaging channels, and gateway security.

The main goal of this release is defense-in-depth. It follows serious concerns about exposed OpenClaw agents, token-stealing remote code execution (RCE) chains, and unsafe default deployments.

Gateway and OpenResponses now enforce a strict SSRF deny policy for URL-based input_file and input_image requests.

This includes hostname allowlists, per-request URL limits, and audit logging for blocked fetch attempts. These controls make it much harder for attackers to use agents to scan or probe internal networks.

Outputs from browser and web tools are now treated as untrusted data. They are wrapped in structured metadata and cleaned before reaching the model, reducing the risk of prompt-injection attacks.

Hooks and webhooks also receive major hardening. Secret comparisons now use constant-time checks, and per-client rate limiting (HTTP 429 with Retry-After) slows brute-force attempts.

By default, POST /hooks/agent blocks payload sessionKey overrides. Operators must configure safe prefixes or manually re-enable legacy behavior.

Component Category Key Feature
Core Platform Security Fixes 40+ vulnerabilities
Gateway SSRF Protection Strict URL allowlists, request limits, audit logging
Model Pipeline Prompt Injection Defense Browser/tool outputs sanitized before model processing
Hooks/Webhooks Hooks Security Constant-time secret checks and rate limiting
Browser Control Authentication Mandatory auth required
Scheduler (Cron) Scheduler Fixes Prevents skipped or duplicate jobs
Gateway Gateway Updates Safe restart handling and larger WebSocket support
Messaging Channels Channel Improvements Safer Telegram, WhatsApp, Slack, Signal, Discord integrations
Release Packages Release Integrity Signed Mac packages with SHA-256 verification

The update also fixes unauthenticated tampering with remote Nostr profile configuration, removes a risky hook, restricts mirrored skill sync to a sandboxed directory, and tightens transcript path validation to block unsafe file access.

Loopback browser control, previously linked to one-click RCE and token leaks, now requires mandatory authentication.

If no credentials are set, OpenClaw automatically generates a secure gateway token. New audit checks also flag unauthenticated browser control routes.

These changes directly address cases where exposed OpenClaw instances allowed full RCE and credential theft.

Reliability improvements are another key part of 2026.2.12. The cron scheduler is heavily patched to prevent skipped jobs, duplicate triggers, and restart-related issues.

Timers now re-arm correctly, and one failing job no longer blocks others. Heartbeat logic is improved to reduce noise and prevent false reminder triggers. Gateway updates ensure active sessions drain safely before restart, preventing message loss.

WebSocket limits now support images up to 5 MB. Installations auto-generate authentication tokens and reject missing or undefined tokens. Logging improvements also enhance macOS deployments.

The broader ecosystem also receives updates:

Component Update
Telegram Safer message handling and improved formatting
WhatsApp Better Markdown support and improved media handling
Slack Improved reply handling and bot mention detection
Signal Stronger validation and better mention rendering
Discord Improved DM reactions and thread management
Mac Releases Signed packages with SHA-256 checksum verification

In today’s environment of exposed AI agents and RCE risks, OpenClaw 2026.2.12 provides an important security baseline that operators should deploy as soon as possible.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackPatchSecurity

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

ClickFix Attacks Target Windows Systems to Deploy StealC

Next Post

Malicious Chrome AI Extensions Attack 260K Attacking Users

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us