CVE-2026-32022: OpenClaw safeBins grep -e File Read Bypass (stdin-only policy bypass)
(updated )
OpenClaw tools.exec.safeBins had a stdin-only policy bypass for grep.
If pattern input was supplied through -e / --regexp, the validator consumed the pattern as a flag value and still allowed one positional operand. That positional could be a bare filename like .env.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-32022 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →