The vulnerability existed in the iOS A2UI bridge, which is responsible for communication between the web-based UI (canvas) and the native OpenClaw agent. The core issue was an overly permissive trust model for actions dispatched from the web view.
The function CanvasA2UIActionMessageHandler.userContentController in ScreenWebView.swift would process messages from the web view. To decide if a message was from a trusted source, it checked if the URL was a local file (the bundled scaffold) or if it was a local network URL by calling ScreenController.isLocalNetworkCanvasURL. This latter function simply checked if the URL's host was a local network address (e.g., localhost, 192.168.x.x).
This meant that any webpage loaded from a local network address was implicitly trusted to dispatch agent.request actions to the iOS node. An attacker could convince a user to open a malicious webpage hosted on the same local network (or the user's Tailnet). This page could then execute unauthorized actions, polluting the session state.
The patch rectifies this by removing the isLocalNetworkCanvasURL function entirely. It introduces a stricter trust model where a remote URL is only considered trusted if it has been explicitly marked as such during navigation. The ScreenController.navigate function was modified to accept a trustA2UIActions parameter, which is only set to true when navigating to the legitimate, capability-backed A2UI host. The isTrustedCanvasUIURL function was updated to enforce this new, explicit trust, effectively preventing generic local pages from dispatching actions.