← Articles
OpenClaw Security Hardening March 12, 2026

OpenClaw Security Sprint: Unicode Obfuscation, WebSocket Limits, Webhook Hardening

Vincent Koc lands six security-focused commits addressing command injection vectors, pre-auth resource exhaustion, and webhook authentication gaps.

About the Author

Vincent Koc is a core maintainer of OpenClaw, leading security hardening initiatives and infrastructure reliability work across the project.

The Coordinated Push

Today's commit log shows a systematic security audit in action. Six hardening commits landed within a two-hour window, each addressing a distinct attack surface. This isn't coincidental bug-fixing — it's coordinated defense-in-depth work.

Unicode command obfuscation detection 99170e2
Pre-auth WebSocket handshake limits eff0d5a
LINE webhook signature requirements 48cbfdf
Feishu webhook encrypt key requirements 7844bc8
Feishu reaction chat type preservation 3e730c0
Transcript emission post-compaction 688e3f0

Unicode Command Obfuscation

The most technically interesting fix addresses a subtle attack vector: Unicode characters that look like safe commands but aren't.

Attack Example: An attacker could submit what appears to be ls -la but contains invisible Unicode tag characters or homoglyphs that bypass pattern matching, potentially executing arbitrary commands.

The fix (99170e2) implements several layers of defense:

Pre-Auth WebSocket Limits

WebSocket connections are expensive to maintain. If an attacker can open many connections before authentication, they can exhaust server resources without ever proving identity.

The fix (eff0d5a) implements:

This is classic "fail fast" security: don't let unauthenticated clients consume resources.

Webhook Authentication

Two commits address webhook authentication for messaging platforms:

LINE Webhook Signatures (48cbfdf)

LINE's messaging API uses HMAC-SHA256 signatures to verify webhook authenticity. The fix:

Feishu Encrypt Key (7844bc8)

Feishu (Lark) webhooks support encryption. The fix requires the encrypt key configuration for webhook endpoints, preventing misconfiguration that could accept unverified payloads.

Why This Pattern Matters

OpenClaw has established a rhythm of coordinated security sprints — concentrated pushes that systematically address related attack surfaces. This is more effective than ad-hoc fixes because:

For a project handling sensitive operations (executing commands, managing API keys, accessing user data), this systematic approach is essential for maintaining trust.

Previous Security Work

Today's sprint continues a pattern established in earlier hardening efforts: