Peter Steinberger lands six security-focused commits addressing webhook authentication, HTTP handler isolation, and SMS sending defaults — continuing the systematic hardening that began with February's Valentine's Day blitz.
The Line messaging integration's webhook endpoint was missing the plugin-authenticated marker. This meant incoming webhooks from Line weren't validated against the expected Line signature, potentially allowing spoofed messages to trigger agent actions.
The fix adds proper authentication requirements, ensuring only legitimate Line webhook payloads are processed. This is the same pattern applied across other messaging integrations (Slack, Discord, Telegram) during previous hardening passes.
Two commits address how plugins register HTTP handlers:
/*) that might intercept requests intended for other handlers. The refactor ensures explicit route registration.The new lint guard script catches future regressions — any new registerHttpHandler usage gets flagged for review.
The sms.send action on "dangerous" nodes (nodes with elevated privileges) now has hardened defaults. This addresses scenarios where a compromised agent might attempt to send SMS messages through a privileged node, potentially for phishing or social engineering attacks.
The specific hardening includes:
The network layer now has unified handling of proxy environment variables (HTTP_PROXY, HTTPS_PROXY, NO_PROXY) and "guarded fetch modes." This ensures consistent security policy application regardless of which code path makes outbound requests.
Today's commits continue a pattern established in February:
The systematic approach — fixing issues, adding lints to catch regressions, unifying code paths — suggests OpenClaw is maturing from a hobbyist project to infrastructure suitable for enterprise deployment. For AI assistants handling sensitive operations (messaging, file access, code execution), this security posture is essential.
Users running OpenClaw should update to get these fixes. The changes are backward-compatible but significantly improve the security posture of installations that: