OpenClaw 2026.2.23 Hardens Security While Adding Claude Opus 4.6 Support


OpenClaw v2026.2.23 brings enterprise-grade security fixes to its 215,000+ GitHub star AI assistant. New HTTP security headers, SSRF protection, and credential redaction block prompt injection and data leaks. Claude Opus 4.6, Moonshot Kimi video analysis, and Kilo Gateway integration expand capabilities across macOS, Windows, Linux.

Privacy-focused users gain Strict-Transport-Security headers for direct HTTPS deployments. Comprehensive validation and documentation ship with HSTS implementation. Man-in-the-middle attacks face immediate blocking.

Session cleanup introduces disk budget controls preventing storage overflows. Transcript handling eliminates local data accumulation risks completely. Production deployments run indefinitely without cleanup failures.

Breaking change defaults browser SSRF policy to trusted-network mode. Private network users run openclaw doctor --fix for seamless migration. Legacy allowPrivateNetwork configs auto-convert safely.

Configuration snapshots redact env. and skills.env. keys automatically.** Restore functionality preserved while blocking exposure in logs and diagnostics. OTEL telemetry scrubs API keys before export.

Security Hardening Table

FixThreat BlockedImpact
SSRF PolicyInternal network scansDefaults to trusted-network
Config RedactionAPI key leaksenv.* hidden in snapshots
Command ApprovalObfuscated injectionManual approval required
Skills XSSStored cross-site scriptingHTML input escaping
OTEL RedactionTelemetry exposureKeys scrubbed pre-export

Skills packaging rejects symlink escapes and XSS-vulnerable gallery prompts. ACP client demands trusted tool IDs with scoped read permissions only.

AI Feature Upgrades

Kilo Gateway gains native Claude Opus 4.6 support with full auth stack. Cache handling and onboarding streamline enterprise deployments significantly.

Vercel AI normalizes shorthand Claude references automatically. Moonshot Kimi joins web_search with enhanced citation extraction accuracy.

Native Moonshot video analysis debuts alongside refactored media execution. URL/header precedence fixes resolve longstanding parsing conflicts.

Per-agent cacheRetention overrides minimize prompt token waste. Bootstrap caching accelerates cold starts dramatically across deployments.

Context pruning extends to Moonshot/Kimi providers seamlessly. 502/503 overflow detection triggers intelligent failover routing.

OpenClaw bridges WhatsApp, Telegram with hardened messaging integrations. Anthropic OAuth beta quirks resolved alongside group policy fixes. Telegram polling stabilizes under high load reliably.

Dozens of contributors delivered production-grade security. Rapid evolution positions OpenClaw as secure multi-model AI gateway leader.

Migration Commands

  • openclaw doctor --fix for SSRF policy migration
  • Verify HSTS headers on HTTPS endpoints
  • Test session cleanup disk controls
  • Validate redacted config snapshots
  • Confirm OTEL key scrubbing

Local AI deployments gain enterprise hardening without cloud dependency. Self-hosted gateways run production workloads securely across platforms.

FAQ

What triggers SSRF policy breaking change?

Browser defaults shift to trusted-network blocking private network requests.

Which credentials get redacted automatically?

env., skills.env., API keys in OTEL diagnostics and snapshots.

New AI providers added?

Kilo Gateway with Claude Opus 4.6, Moonshot Kimi video/web_search.

How to migrate legacy private network access?

Run openclaw doctor --fix command once post-upgrade.

Does release fix messaging app stability?

Yes. Telegram polling, WhatsApp groups, Anthropic OAuth all hardened.

Installation platforms supported?

macOS, Windows, Linux with cross-platform security controls.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages