Command injection in the maintainer/dev script scripts/update-clawtributors.ts.
Affects contributors/maintainers (or CI) who run bun scripts/update-clawtributors.ts in a source checkout that contains a malicious commit author email (e.g. crafted @users.noreply.github.com values).
Normal CLI usage is not affected (npm i -g openclaw): this script is not part of the shipped CLI and is not executed during routine operation.
v2026.1.8 through v2026.2.13 (inclusive)>= 2026.1.8, < 2026.2.14The script derived a GitHub login from git log author metadata and interpolated it into a shell command (via execSync). A malicious commit record could inject shell metacharacters and execute arbitrary commands when the script is run.
a429380e337152746031d290432a4b93aa553d552026.2.14Thanks @scanleale and @MegaManSec (https://joshua.hu) of AISLE Research Team for reporting.
{
"cwe_ids": [
"CWE-78"
],
"github_reviewed": true,
"nvd_published_at": "2026-02-19T23:16:25Z",
"severity": "HIGH",
"github_reviewed_at": "2026-02-18T00:46:54Z"
}