Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key →
← Back to dashboard
clawsmith.com/signal/cve-2026-41329-sandbox-bypass-cvss-99
IssueWide OpenLive

CVE-2026-41329: Critical CVSS 9.9 Sandbox Bypass Lets Attackers Escalate Privileges via Heartbeat Context

Critical sandbox bypass in OpenClaw before v2026.3.31 via heartbeat context inheritance and senderIsOwner parameter manipulation. Published April 21, 2026.

Product Idea from this Signal

A CLI tool that validates OpenClaw workspace integrity and blocks .env injection, config poisoning, and prompt injection before the agent boots

1.6k

OpenClaw loads .env files from the current working directory before its trusted configuration, and trusts heartbeat context inheritance without proper validation. CVE-2026-41294 (CVSS 8.6) and CVE-2026-41329 (CVSS 9.9) exploit these pre-boot trust assumptions. With 138+ CVEs tracked in 63 days and 397-point HN posts calling the platform a security nightmare, operators need a pre-boot safety gate that catches workspace-level attacks before the agent gets any execution context.

CLISECURITYOPEN-SOURCEDEVTOOLPRE-BOOT
CompetitiveView Opportunity →

Score Breakdown

HN
770

Frequently Asked Questions