Skip to content

2026-03-29 — OpenClaw ACP approval prompt ANSI escape sequence injection (GHSA-4hmj-39m8-jwc7)

Product: OpenClaw (npm package: openclaw)

Impact (per advisory): Untrusted tool titles could carry ANSI control sequences into approval prompts and logs, letting attacker-controlled text spoof what the human sees.

Why this matters

Approval UIs and permission logs are trust boundaries. If attacker-controlled labels can inject terminal control codes, they can hide text, change colors, or make a malicious prompt look safe.

  • Patch/upgrade: update to openclaw 2026.3.28 or later.
  • Strip ANSI/control sequences from all untrusted labels before rendering.
  • Treat logs as hostile render targets; prefer plain-text output.
  • Test approval surfaces with escape-sequence payloads.

Detection / hunting ideas

  • Grep approval and logging paths for raw untrusted titles or labels.
  • Add tests with \x1b[ sequences to confirm they are neutralized.

References