tools.exec.safeBins could be bypassed for filesystem access when sort output flags (-o / --output) or recursive grep flags were allowed through safe-bin execution paths.
openclaw (npm)<= 2026.2.17>= 2026.2.192026.2.17In deployments that enabled tools.exec.safeBins, an attacker with access to command execution flows could turn intended stdin-only safe-bin usage into file writes (sort -o) or recursive file reads (grep -R).
cfe8457a0f4aae5324daec261d3b0aad1461a4bcThanks @nedlir for reporting.
{
"nvd_published_at": null,
"github_reviewed_at": "2026-02-19T22:06:00Z",
"github_reviewed": true,
"severity": "LOW",
"cwe_ids": [
"CWE-184",
"CWE-78"
]
}