Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key →
← Back to dashboard
clawsmith.com/signal/cve-2026-41294-env-var-injection-dot-env
IssueWide OpenLive

CVE-2026-41294: CVSS 8.6 Env Var Injection via Malicious .env File in OpenClaw

High-severity vulnerability allows attackers to override critical runtime config by placing crafted .env file in workspace. OpenClaw loads .env before trusted state-dir config. Fixed in v2026.3.28.

Product Idea from this Signal

A CLI tool that validates OpenClaw workspace integrity and blocks .env injection, config poisoning, and prompt injection before the agent boots

1.6k

OpenClaw loads .env files from the current working directory before its trusted configuration, and trusts heartbeat context inheritance without proper validation. CVE-2026-41294 (CVSS 8.6) and CVE-2026-41329 (CVSS 9.9) exploit these pre-boot trust assumptions. With 138+ CVEs tracked in 63 days and 397-point HN posts calling the platform a security nightmare, operators need a pre-boot safety gate that catches workspace-level attacks before the agent gets any execution context.

CLISECURITYOPEN-SOURCEDEVTOOLPRE-BOOT
CompetitiveView Opportunity →

Score Breakdown

Issues
86

Frequently Asked Questions