OpenClaw loaded the current working directory .env before trusted state-dir configuration, allowing untrusted workspace state to inject host environment values.
A repository or workspace containing a malicious .env file could override runtime configuration and security-sensitive environment settings when OpenClaw started there.
src/infra/dotenv.ts, src/cli/dotenv.ts
<= 2026.3.24>= 2026.3.282026.3.28 contains the fix.Fixed by commit 6a79324802 (Filter untrusted CWD .env entries before OpenClaw startup).
2026.3.28Exploitability
AV:NAC:LPR:NUI:RScope
S:CImpact
C:HI:HA:H9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H