GHSA-rv2q-f2h5-6xmg: OpenClaw's Node role device-identity bypass allows unauthorized node.event injection
A client authenticated with a shared gateway token could connect as role=node without device identity/pairing, then call node.event to trigger agent.request and voice.transcript flows.
References
Code Behaviors & Features
Detect and mitigate GHSA-rv2q-f2h5-6xmg with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →