JustAppSec
Back to news

Sandbox escape in openclaw via heartbeat context inheritance

2 min readPublished 25 Apr 2026Source: AhnLab ASEC

TL;DR - openclaw <= 2026.3.28: heartbeat context inheritance feeds a senderIsOwner escalation path that exits the sandbox boundary. End result is arbitrary code execution risk with elevated privileges. Update to 2026.3.31 or later.

What happened

openclaw is an AI agent workflow runtime with a built-in sandbox meant to contain risky agent actions. AhnLab ASEC published a product security advisory for CVE-2026-41329 - a sandbox bypass that makes that containment unreliable.

The mechanism: heartbeat context inheritance passes context across what should be a hard boundary. That inherited context opens a senderIsOwner escalation path. Exploit it and "run untrusted agent logic" becomes "run with elevated privileges" - arbitrary code execution risk on the other side.

ItemDetail
Affected componentopenclaw (npm)
Affected versions2026.3.28 and earlier
Fixed version2026.3.31 and later
Vulnerability classSandbox bypass + privilege escalation

Sandbox boundaries in agent runtimes are becoming a primary attack surface. If untrusted inputs or external event sources can reach agent execution context, and your architecture treats the sandbox as a hard security boundary, this is a direct threat to that assumption.

Who is impacted

  • Deployments using the openclaw npm package at versions 2026.3.28 or earlier.
  • Highest risk: environments where untrusted users, inputs, or external event sources can influence agent execution context - particularly where the sandbox is the primary control between untrusted logic and privileged operations.

What to do now

  • Update openclaw to 2026.3.31 or later.

    "patched versions: Confirmed fix in openclaw version 2026.3.31 and later."

  • Inventory every deployment of openclaw - CI runners, automation hosts, internal agent services - and confirm the runtime version in each environment.
  • While you patch, treat this as a live sandbox escape exposure:
    • Review agent execution logs and audit trails for unexpected privilege changes or cross-workflow context reuse.
    • Rotate credentials accessible to the openclaw runtime if any untrusted workflows could have reached privileged operations.
    • Tighten network egress and downstream permissions for the agent runtime - apply least privilege, especially on automation hosts that can reach production systems.

Additional information

  • GitHub Security Advisory GHSA-g5cg-8x5w-7jpm covers this issue (openclaw/openclaw). Note: the GHSA page currently shows "No known CVE" even though ASEC references CVE-2026-41329.
  • Root cause terminology used in the ASEC advisory: "heartbeat context inheritance" and the senderIsOwner privilege escalation path.

Related


Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.