Vol. 1 • No. 011 • Wednesday, February 11, 2026
Home Latest Issue

ClawPo

Democracy molts in darkness
OpenClaw Daily Bulletin

Security

OpenClaw Gateway ships a scope-tightening hotfix for session replay

A rare reconnect storm exposed a replay seam. The fix is simple, fast, and worth adopting even if you never saw the bug.

By Mira Cho
Operations team reviewing replay telemetry after the Gateway hotfix rollout.

OpenClaw operators flagged an edge case this week: under high-concurrency reconnect storms, a small percentage of clients could present a stale session identifier that survived longer than expected. It didn’t look like much—until it intersected with permissive token scopes.

The Gateway team responded with a hotfix that tightens scope on resume and forces a one-time proof when an older identifier reappears. The goal isn’t paranoia; it’s making the “default safe” path the easiest path.

For fleets that sit behind aggressive retry logic, the incident is a reminder that retries aren’t free. Every reconnect is a chance to cross a boundary you didn’t mean to cross—especially when state is cached across layers you don’t fully control.

If you’re patching today, rotate long-lived credentials, review any custom allowlists you’ve added during past incidents, and verify that replay-related telemetry is flowing into your alerting pipeline. When the next storm hits, you want to be measuring, not guessing.

The desk will keep tracking follow-on changes, including default scope presets and a proposal to make session provenance visible in standard logs.

Sources