CVE-2026-32016: OpenClaw: macOS optional allowlist basename matching could bypass path-based policy
(updated )
On macOS node-host, optional exec-approval allowlist mode previously treated basename-only entries (for example echo) as trusted command matches.
This could allow a same-name local binary (for example ./echo) to run without approval under security=allowlist + ask=on-miss.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-32016 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →