每日自动更新

🛡️ UCloud OpenClaw CVEs

安全漏洞追踪面板 — 基于 cvelistV5 + GitHub Advisory Database 数据

13
已发布 CVE
154
安全公告
72
HIGH / CRITICAL
13/13
Pipeline 全部已发布

📋 已发布 CVE(cvelistV5)

109
CVE ID严重性CVSS漏洞描述发布日期
CVE-2026-28363 🟣 CRITICAL 9.9 In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be… 2026-02-27
CVE-2026-28466 🟣 CRITICAL 9.4 OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval Bypass 2026-03-05
CVE-2026-32978 🟣 CRITICAL 9.4 OpenClaw < 2026.3.11 - Approval Bypass via Unrecognized Script Runners 2026-03-29
CVE-2026-28474 🟣 CRITICAL 9.3 OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing 2026-03-05
CVE-2026-32987 🟣 CRITICAL 9.3 OpenClaw < 2026.3.13 - Bootstrap Setup Code Replay via Device Pairing 2026-03-29
CVE-2026-32915 🟣 CRITICAL 9.3 OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Subagent Control Surface 2026-03-29
CVE-2026-28446 🟣 CRITICAL 9.2 OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching 2026-03-05
CVE-2026-32918 🟣 CRITICAL 9.2 OpenClaw < 2026.3.11 - Session Sandbox Escape via session_status Tool 2026-03-29
CVE-2026-22171 🔴 HIGH 8.8 OpenClaw < 2026.2.19 - Path Traversal in Feishu Media Temporary File Naming 2026-03-18
CVE-2026-24763 🔴 HIGH 8.8 OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable 2026-02-02
CVE-2026-25253 🔴 HIGH 8.8 OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl 2026-02-01
CVE-2026-32974 🔴 HIGH 8.8 OpenClaw < 2026.3.12 - Forged Event Injection via Feishu Webhook Verification Token 2026-03-29
CVE-2026-28478 🔴 HIGH 8.7 OpenClaw affected by denial of service via unbounded webhook request body buffering 2026-03-05
CVE-2026-28461 🔴 HIGH 8.7 OpenClaw < 2026.3.1 - Unbounded Memory Growth in Zalo Webhook via Query String Key Churn 2026-03-19
CVE-2026-32011 🔴 HIGH 8.7 OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing 2026-03-19
CVE-2026-32013 🔴 HIGH 8.7 OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods 2026-03-19
CVE-2026-32042 🔴 HIGH 8.7 OpenClaw < 2026.2.25 - Privilege Escalation via Unpaired Device Identity in Shared Gateway Authentication 2026-03-21
CVE-2026-32846 🔴 HIGH 8.7 OpenClaw Media Parsing Path Traversal to Arbitrary File Read 2026-03-26
CVE-2026-32060 🔴 HIGH 8.7 OpenClaw < 2026.2.14 - Path Traversal in apply_patch via Crafted Paths 2026-03-11
CVE-2026-32914 🔴 HIGH 8.7 OpenClaw < 2026.3.12 - Insufficient Access Control in /config and /debug Endpoints 2026-03-29
CVE-2026-32051 🔴 HIGH 8.7 OpenClaw < 2026.3.1 - Authorization Bypass in Agent Runs via Owner-Only Tool Access 2026-03-21
CVE-2026-32980 🔴 HIGH 8.7 OpenClaw < 2026.3.13 - Resource Exhaustion via Unauthenticated Telegram Webhook Request 2026-03-29
CVE-2026-32982 🔴 HIGH 8.7 OpenClaw < 2026.3.13 - Telegram Bot Token Exposure in Media Fetch Error Logs 2026-03-31
CVE-2026-26323 🔴 HIGH 8.6 OpenClaw has a command injection in maintainer clawtributors updater 2026-02-19
CVE-2026-28456 🔴 HIGH 8.6 OpenClaw 2026.1.5 < 2026.2.14 - Arbitrary Code Execution via Unsafe Hook Module Path Handling 2026-03-05
CVE-2026-32014 🔴 HIGH 8.6 OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields 2026-03-19
CVE-2026-32920 🔴 HIGH 8.6 OpenClaw < 2026.3.12 - Arbitrary Code Execution via Auto-Discovery of Workspace Plugins 2026-03-31
CVE-2026-28468 🔴 HIGH 8.5 OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Server 2026-03-05
CVE-2026-28453 🔴 HIGH 8.3 OpenClaw < 2026.2.14 - Zip Slip Path Traversal in TAR Archive Extraction 2026-03-05
CVE-2026-28393 🔴 HIGH 8.3 OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform Path Traversal 2026-03-05
CVE-2026-31998 🔴 HIGH 8.3 OpenClaw 2026.2.22 < 2026.2.24 - Authorization Bypass in Synology Chat Plugin via Empty allowedUserIds 2026-03-19
CVE-2026-32004 🔴 HIGH 8.3 OpenClaw < 2026.3.2 - Authentication Bypass via Encoded Path in /api/channels Route 2026-03-19
CVE-2026-32036 🔴 HIGH 8.3 OpenClaw < 2026.2.26- Authentication Bypass via Encoded Dot-Segment Traversal in /api/channels 2026-03-19
CVE-2026-28392 🔴 HIGH 8.2 OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct Messages 2026-03-05
CVE-2026-28454 🔴 HIGH 8.2 OpenClaw < 2026.2.2 - Authorization Bypass via Unauthenticated Telegram Webhook 2026-03-05
CVE-2026-28464 🔴 HIGH 8.2 OpenClaw < 2026.2.12 - Timing Attack in Hooks Token Authentication 2026-03-05
CVE-2026-29611 🔴 HIGH 8.2 OpenClaw < 2026.2.14 - Local File Inclusion via mediaPath Parameter in BlueBubbles Media Handling 2026-03-05
CVE-2026-28469 🔴 HIGH 8.2 OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting 2026-03-05
CVE-2026-32045 🔴 HIGH 8.2 OpenClaw < 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscale Auth 2026-03-21
CVE-2026-32302 🔴 HIGH 8.1 OpenClaw: Untrusted web origins can obtain authenticated operator.admin access in trusted-proxy mode 2026-03-12
CVE-2026-25157 🔴 HIGH 7.8 OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand 2026-02-04
CVE-2026-27002 🔴 HIGH 7.7 OpenClaw: Docker container escape via unvalidated bind mount config injection 2026-02-19
CVE-2026-32048 🔴 HIGH 7.7 OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn 2026-03-21
CVE-2026-32056 🔴 HIGH 7.7 OpenClaw < 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Injection in system.run 2026-03-21
CVE-2026-26322 🔴 HIGH 7.6 OpenClaw Gateway tool allowed unrestricted gatewayUrl override 2026-02-19
CVE-2026-32005 🔴 HIGH 7.6 OpenClaw < 2026.2.25 - Authorization Bypass in Interactive Callbacks via Sender Check Skip 2026-03-19
CVE-2026-26319 🔴 HIGH 7.5 OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests 2026-02-19
CVE-2026-25474 🔴 HIGH 7.5 OpenClaw has a Telegram webhook request forgery (missing `channels.telegram.webhookSecret`) → auth bypass 2026-02-19
CVE-2026-26321 🔴 HIGH 7.5 OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension 2026-02-19
CVE-2026-28485 🔴 HIGH 7.5 OpenClaw 2026.1.5 < 2026.2.12 - Missing Authentication in Browser Control HTTP Endpoints 2026-03-05
CVE-2026-32003 🔴 HIGH 7.5 OpenClaw < 2026.2.22 - Remote Code Execution via SHELLOPTS/PS4 Environment Injection in system.run 2026-03-19
CVE-2026-32025 🔴 HIGH 7.5 OpenClaw < 2026.2.25 - Password Brute-Force via Browser-Origin WebSocket Authentication Bypass 2026-03-19
CVE-2026-28458 🔴 HIGH 7.4 OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access 2026-03-05
CVE-2026-32015 🔴 HIGH 7.3 OpenClaw 2026.1.21 < 2026.2.19 - PATH Hijacking Bypass in tools.exec.safeBins Allowlist Validation 2026-03-19
CVE-2026-32032 🔴 HIGH 7.3 OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variable 2026-03-19
CVE-2026-32971 🔴 HIGH 7.3 OpenClaw < 2026.3.11 - Node-Host Approval UI Mismatch Allows Execution of Unintended Commands 2026-03-31
CVE-2026-26325 🔴 HIGH 7.2 OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals 2026-02-19
CVE-2026-22175 🔴 HIGH 7.1 OpenClaw < 2026.2.23 - Exec Approval Bypass via Unrecognized Multiplexer Shell Wrappers 2026-03-18
CVE-2026-26317 🔴 HIGH 7.1 OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints 2026-02-19
CVE-2026-27522 🔴 HIGH 7.1 OpenClaw < 2026.2.24 - Arbitrary File Read via sendAttachment and setGroupIcon Message Actions 2026-03-18
CVE-2026-27566 🔴 HIGH 7.1 OpenClaw < 2026.2.22 - Allowlist Bypass via Wrapper Binary Unwrapping in system.run 2026-03-19
CVE-2026-29607 🔴 HIGH 7.1 OpenClaw < 2026.2.22 - Authorization Bypass via allow-always Wrapper Persistence 2026-03-19
CVE-2026-28447 🔴 HIGH 7 OpenClaw 2026.1.29-beta.1 < 2026.2.1 - Path Traversal in Plugin Installation via Package Name 2026-03-05
CVE-2026-32009 🔴 HIGH 7 OpenClaw < 2026.2.24 - Binary Hijacking via Static Default Trusted Directories in safeBins 2026-03-19
CVE-2026-22176 🟡 MEDIUM 6.9 OpenClaw < 2026.2.19 - Command Injection via Unescaped Environment Variables in Windows Scheduled Task Script Generation 2026-03-19
CVE-2026-27004 🟡 MEDIUM 6.9 OpenClaw session tool visibility hardening and Telegram webhook secret fallback 2026-02-19
CVE-2026-31994 🟡 MEDIUM 6.9 OpenClaw < 2026.2.19 - Local Command Injection via Unsafe cmd Argument Handling in Windows Scheduled Task Script Generation 2026-03-19
CVE-2026-28480 🟡 MEDIUM 6.9 OpenClaw Telegram allowlist authorization accepted mutable usernames 2026-03-05
CVE-2026-32053 🟡 MEDIUM 6.9 OpenClaw < 2026.2.23 - Twilio Webhook Replay Bypass via Randomized Event ID Normalization 2026-03-21
CVE-2026-32919 🟡 MEDIUM 6.9 OpenClaw < 2026.3.11 - Unauthorized Session Reset via agent Slash Commands 2026-03-29
CVE-2026-34505 🟡 MEDIUM 6.9 OpenClaw < 2026.3.12 - Webhook Rate Limiting Bypass via Pre-Authentication Secret Validation 2026-03-31
CVE-2026-29612 🟡 MEDIUM 6.8 OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding 2026-03-05
CVE-2026-26972 🟡 MEDIUM 6.7 OpenClaw has a Path Traversal in Browser Download Functionality 2026-02-19
CVE-2026-28452 🟡 MEDIUM 6.7 OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) 2026-03-05
CVE-2026-32044 🟡 MEDIUM 6.7 OpenClaw < 2026.3.2 - Tar Archive Safety Bypass in Skills Installation 2026-03-21
CVE-2026-26328 🟡 MEDIUM 6.5 OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities 2026-02-19
CVE-2026-28395 🟡 MEDIUM 6.3 OpenClaw 2026.1.14-1 < 2026.2.12 - Unintended Public Binding of Chrome Extension Relay via Wildcard cdpUrl 2026-03-05
CVE-2026-28451 🟡 MEDIUM 6.3 OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching 2026-03-05
CVE-2026-28448 🟡 MEDIUM 6.3 OpenClaw 2026.1.29 < 2026.2.1 - Authorization Bypass in Twitch Plugin allowFrom Access Control 2026-03-05
CVE-2026-32029 🟡 MEDIUM 6.3 OpenClaw < 2026.2.21 - Client IP Spoofing via X-Forwarded-For Header Parsing 2026-03-19
CVE-2026-32031 🟡 MEDIUM 6.3 OpenClaw < 2026.2.26 - Authentication Bypass via Path Canonicalization Mismatch in /api/channels Gateway 2026-03-19
CVE-2026-32896 🟡 MEDIUM 6.3 OpenClaw < 2026.2.21 - Unauthenticated Webhook Access via Passwordless Fallback in BlueBubbles Plugin 2026-03-21
CVE-2026-32050 🟡 MEDIUM 6.3 OpenClaw < 2026.2.25 - Unauthorized Reaction Status Event Enqueue via Access Check Bypass 2026-03-21
CVE-2026-32034 🟡 MEDIUM 6.1 OpenClaw < 2026.2.21 - Insecure Control UI Authentication over Plaintext HTTP 2026-03-19
CVE-2026-32039 🟡 MEDIUM 6 OpenClaw < 2026.2.22 - Sender Authorization Bypass via Identity Collision in toolsBySender 2026-03-19
CVE-2026-32057 🟡 MEDIUM 6 OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter 2026-03-21
CVE-2026-32043 🟡 MEDIUM 5.9 OpenClaw < 2026.2.25 - Time-of-Check-Time-of-Use via Mutable Symlink in system.run cwd Parameter 2026-03-21
CVE-2026-22217 🟡 MEDIUM 5.8 OpenClaw 2026.2.22 < 2026.2.23 - Arbitrary Binary Execution via $SHELL Environment Variable Trusted Prefix Fallback 2026-03-18
CVE-2026-27670 🟡 MEDIUM 5.8 OpenClaw < 2026.3.2 - Arbitrary File Write via ZIP Extraction Parent Symlink Race Condition 2026-03-19
CVE-2026-32010 🟡 MEDIUM 5.8 OpenClaw < 2026.2.22 - Allowlist Bypass via sort --compress-program Parameter 2026-03-19
CVE-2026-32035 🟡 MEDIUM 5.8 OpenClaw < 2026.3.2 - Missing Owner Flag Validation in Discord Voice Transcript Handler 2026-03-19
CVE-2026-32052 🟡 MEDIUM 5.8 OpenClaw < 2026.2.24 - Hidden Command Execution via Shell-Wrapper Positional argv Carriers 2026-03-21
CVE-2026-32988 🟡 MEDIUM 5.8 OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Unvalidated Temporary File Creation 2026-03-31
CVE-2026-29608 🟡 MEDIUM 5.4 OpenClaw 2026.3.1 < 2026.3.2 - Approval Integrity Bypass via system.run argv Rewriting 2026-03-19
CVE-2026-26326 🟡 MEDIUM 5.3 OpenClaw skills.status could leak secrets to operator.read clients 2026-02-19
CVE-2026-31989 🟡 MEDIUM 5.3 OpenClaw < 2026.3.1 - Server-Side Request Forgery via web_search Citation Redirect 2026-03-19
CVE-2026-32898 🟡 MEDIUM 5.3 OpenClaw < 2026.2.23 - ACP Permission Auto-Approval Bypass via Untrusted Tool Metadata 2026-03-21
CVE-2026-32921 🟡 MEDIUM 5.3 OpenClaw < 2026.3.8 - Script Content Modification via Mutable Operand Binding in system.run 2026-03-31
CVE-2026-27576 🟡 MEDIUM 4.8 OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs 2026-02-21
CVE-2026-32046 🟡 MEDIUM 4.8 OpenClaw < 2026.2.21 - OS-level Sandbox Bypass via --no-sandbox Flag 2026-03-21
CVE-2026-32020 🟡 MEDIUM 4.8 OpenClaw < 2026.2.22 - Arbitrary File Read via Symlink Following in Static File Handler 2026-03-19
CVE-2026-27485 🟡 MEDIUM 4.6 OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection 2026-02-21
CVE-2026-31997 🟡 MEDIUM 4.4 OpenClaw < 2026.3.1 - Executable Rebind via Unbound PATH-token in system.run Approvals 2026-03-19
CVE-2026-24764 🟢 LOW 3.7 OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions 2026-02-19
CVE-2026-32006 🟢 LOW 2.3 OpenClaw < 2026.2.26 - Authorization Bypass via DM Pairing-Store Fallback in Group Allowlist 2026-03-19
CVE-2026-32019 🟢 LOW 2.3 OpenClaw < 2026.2.22 - Incomplete IPv4 Special-Use Range Blocking in SSRF Guard 2026-03-19
CVE-2026-32037 🟢 LOW 2.3 OpenClaw < 2026.2.22 - Redirect Chain Bypass of Media Host Allowlist in MSTeams Attachment Handling 2026-03-19
CVE-2026-31991 🟢 LOW 2 OpenClaw < 2026.2.26 - Authorization Bypass via DM Pairing-Store Leakage in Signal Group Allowlist 2026-03-19
CVE-2026-32067 🟢 LOW 2 OpenClaw < 2026.2.26 - Cross-Account Authorization Bypass in DM Pairing Store 2026-03-21

🔄 CVE 发布流水线

13/13 已发布
CVE ID状态CNAGHSA 发布日期cvelistV5
CVE-2026-24763 ✅ PUBLISHED GitHub_M 2026-02-02 ✅ 已收录
CVE-2026-25157 ✅ PUBLISHED GitHub_M 2026-02-02 ✅ 已收录
CVE-2026-25253 ✅ PUBLISHED mitre 2026-02-02 ✅ 已收录
CVE-2026-26317 ✅ PUBLISHED GitHub_M 2026-02-18 ✅ 已收录
CVE-2026-26328 ✅ PUBLISHED GitHub_M 2026-02-18 ✅ 已收录
CVE-2026-28452 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-28458 ✅ PUBLISHED VulnCheck 2026-02-17 ✅ 已收录
CVE-2026-28469 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-28478 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-28480 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-29612 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-32846 ✅ PUBLISHED VulnCheck 2026-03-26 ✅ 已收录
CVE-2026-32846 ✅ PUBLISHED | [GHSA-7xr2-q9vf-x4r5](https://github.com/advisories/GHSA-7xr2-q9vf-x4r5) 2026-03-26 ✅ 已收录
CVE-2026-28469 ✅ PUBLISHED | [GHSA-3fqr-4cg8-h96q](https://github.com/advisories/GHSA-3fqr-4cg8-h96q) 2026-02-18 ✅ 已收录
CVE-2026-28478 ✅ PUBLISHED | [GHSA-mr32-vwc2-5j6h](https://github.com/advisories/GHSA-mr32-vwc2-5j6h) 2026-02-18 ✅ 已收录
CVE-2026-25157 ✅ PUBLISHED | [GHSA-g8p2-7wf7-98mq](https://github.com/advisories/GHSA-g8p2-7wf7-98mq) 2026-02-02 ✅ 已收录
CVE-2026-24763 ✅ PUBLISHED | [GHSA-r2c6-8jc8-g32w](https://github.com/advisories/GHSA-r2c6-8jc8-g32w) 2026-02-02 ✅ 已收录
CVE-2026-28480 ✅ PUBLISHED | [GHSA-h89v-j3x9-8wqj](https://github.com/advisories/GHSA-h89v-j3x9-8wqj) 2026-02-18 ✅ 已收录
CVE-2026-29612 ✅ PUBLISHED | [GHSA-g34w-4xqq-h79m](https://github.com/advisories/GHSA-g34w-4xqq-h79m) 2026-02-18 ✅ 已收录

📢 安全公告精选

154+
GHSA-fqw4-mph CRITICAL
OpenClaw: Silent privilege escalation via gateway shared-auth reconnect
2026-03-27
GHSA-9hjh-fr4 CRITICAL
OpenClaw: Gateway Backend Reconnect lets Non-Admin Operator Scopes Self-Claim operator.admin
2026-03-27
GHSA-hf68-49f CRITICAL
OpenClaw Gateway: RCE and Privilege Escalation from operator.pairing to operator.admin via device.pair.approve
2026-03-26
GHSA-x49q-fhh CRITICAL
Duplicate Advisory: OpenClaw: WebSocket shared-auth connections could self-declare elevated scopes
2026-03-20
OpenClaw: `browser.request` still allows `POST /reset-profile` through the `operator.write` surface
2026-03-30
OpenClaw: Gateway operator.write Can Reach Admin-Class Channel Allowlist Persistence via chat.send
2026-03-30
OpenClaw has an Arbitrary Malicious Code Execution Vulnerability
2026-03-30
OpenClaw has Sandbox Media Root Bypass via Unnormalized `mediaUrl` / `fileUrl` Parameter Keys (CWE-22)
2026-03-30
OpenClaw: Gateway Plugin Subagent Fallback `deleteSession` Uses Synthetic `operator.admin`
2026-03-29
OpenClaw: SSRF via Unguarded Configured Base URLs in Multiple Channel Extensions (Incomplete Fix for CVE-2026-28476)
2026-03-29
OpenClaw: `session_status` sessionId resolution bypasses sandboxed session-tree visibility
2026-03-29
OpenClaw: Gateway Plugin HTTP Auth Grants Unrestricted operator.admin Runtime Scope to All Callers
2026-03-27

📊 漏洞分类

白名单绕过 (Allowlist Bypass)
60
注入攻击 (XSS/CSRF/Prompt/Command)
34
认证绕过 / 缺失认证
10
SSRF
5
拒绝服务 (DoS)
6
路径穿越 (CWE-22)
3
原型污染 (Prototype Pollution)
1

💡 关键洞察

📈
7.1
平均 CVSS 评分
🔴
554%
HIGH 及以上漏洞占比
100%
CVE 已发布到 cvelistV5
🛡️
100%
已提供修复版本
🏢
3
CNA 来源 (VulnCheck / GitHub / MITRE)
📦
npm
受影响包 (openclaw)