Host execution env sanitization did not block GIT_TEMPLATE_DIR or AWS_CONFIG_FILE, even though both can redirect trusted tooling to attacker-controlled content.
An approved exec request could redirect git or AWS CLI behavior through attacker-controlled configuration and execute untrusted code or load attacker-selected credentials.
src/infra/host-env-security-policy.json, src/infra/host-env-security.ts
<= 2026.3.24>= 2026.3.282026.3.28 contains the fix.Fixed by commit 6eb82fba3c (Infra: block additional host exec env keys).
OpenClaw thanks @nicky-cc of Tencent zhuque Lab https://github.com/Tencent/AI-Infra-Guard for reporting.
{
"github_reviewed": true,
"github_reviewed_at": "2026-03-31T23:57:00Z",
"cwe_ids": [
"CWE-184"
],
"severity": "MODERATE",
"nvd_published_at": null
}