openclaw created new session transcript JSONL files with overly broad default permissions in affected releases. On multi-user hosts, other local users or processes could read transcript contents, including secrets that might appear in tool output.
openclaw (npm)<= 2026.2.152026.2.172026.3.13 (not affected)Session transcript JSONL files are created under the local OpenClaw session store. In affected releases, newly created transcript files did not force user-only permissions, so transcript contents could be readable by other local users depending on the host environment and umask behavior.
New transcript files are now created with 0o600 permissions. Existing transcript permission drift is also remediated by the security audit fix flow.
Verified in code:
src/config/sessions/transcript.ts:82 writes new transcript files with mode: 0o600src/config/sessions/sessions.test.ts:303 includes regression coverage asserting 0o600095d522099653367e1b76fa5bb09d4ddf7c8a57cThis fix first shipped in 2026.2.17 and is present in the current npm release 2026.3.13.
{
"nvd_published_at": null,
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-276",
"CWE-732"
],
"github_reviewed_at": "2026-03-16T20:41:51Z"
}