GHSA-7fcc-cw49-xm78: OpenClaw has command injection via Windows shell fallback in Lobster tool execution
The Lobster extension tool execution path used a Windows shell fallback (shell: true) after spawn failures (EINVAL/ENOENT). In that fallback path, shell metacharacters in command arguments can be interpreted by the shell, enabling command injection.
References
Code Behaviors & Features
Detect and mitigate GHSA-7fcc-cw49-xm78 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →