BACK TO ARCHIVE
2026-03-28P1 CRITICAL
CASE #0071

AntGroup Audit Discloses 33 Vulnerabilities Including Zero-Scope /pair approve

AntGroup's AI Security Lab ran a 3-day audit against OpenClaw and disclosed 33 vulnerabilities — notably a critical /pair approve command with zero scope validation and no audit trail. 8 were patched immediately in 2026.3.28; the remaining 25 were fixed over subsequent weeks. No breach occurred — the audit was proactive.

CONFIRMED
🔓 SECURITY LEAK
Incident Brief

AntGroup's AI Security Lab conducted a proactive 3-day security audit of OpenClaw — a framework whose agents hold access to email, calendar, files, and terminal. The audit surfaced 33 vulnerabilities spanning authorization, input handling, and secret management. The most severe was in the /pair approve command, which performed zero scope validation on the caller, allowing any low-privilege operator to silently approve admin-level device pairings with no audit-log entry. Because the audit was proactive rather than reactive to a breach, OpenClaw had a short window to patch before public disclosure. 8 vulnerabilities (1 critical, 4 high, 3 medium) shipped fixes in 2026.3.28 concurrent with the public advisory; the remaining 25 were addressed over the following 6 weeks.

Root Cause

The Actual Culprit

A framework built by a small team outran its own security-review capacity. Critical authorization paths (pairing, scope checks) had never been audited by an external red team until AntGroup.

What Was Done
[OK]All 8 priority fixes shipped in 2026.3.28
[OK]External security audit scheduled quarterly going forward
[OK]Authorization code path added to mandatory review list for every PR
[OK]Audit-trail coverage made a non-negotiable acceptance criterion for privileged ops
Lessons Learned
shield

Proactive audits are the cheapest security spend

33 findings pre-breach is a fraction of the cost of 33 findings post-breach. Budget for external audits before you think you need one.

users

Authorization code needs a second pair of eyes

Every scope check, every approval path, every privilege boundary — someone other than the author should review it before it ships.

Comments (0)

Loading comments...

0/1000
Case Info
Case Number
#0071
Severity
🔥P1 CRITICAL
Severity Level
Date
2026-03-28
Affected Systems
Authorization Layer
Pairing Workflow
Audit Logging
Source
twitter
Published: 2026-03-28