clawsmith.com/signal/cve-2026-41299-acp-provenance-bypass-websocket
⚠ IssueWide OpensecurityLive
CVE-2026-41299: Gateway ACP Provenance Guard Bypassed by WebSocket Client Identity Spoofing
OpenClaw before 2026.3.28 allows authenticated operator clients to spoof ACP identity labels and inject reserved provenance fields via manipulated WebSocket handshake metadata, bypassing authorization (CVSS 7.1).
Score Breakdown
Issues
7
Social Proof 4 sources
Frequently Asked Questions
Virality Score
7
across 4 platforms
Details
Signalissue
Ecosystemsecurity
Sources4
Platforms4
Updated2h ago
Trend→ stable
Top ideas
All ideas →