GHSA-mqr9-vqhq-3jxw: OpenClaw Windows Scheduled Task script generation allowed local command injection via unsafe cmd argument handling
OpenClaw Windows Scheduled Task script generation allowed unsafe argument handling in generated gateway.cmd files. In vulnerable versions, cmd metacharacter-only values could be emitted without safe quoting/escaping, which could lead to unintended command execution when the scheduled task runs.
References
Code Behaviors & Features
Detect and mitigate GHSA-mqr9-vqhq-3jxw with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →