The vulnerability is a local Denial of Service in the openclaw package, caused by insecure extraction of .tar.bz2 archives. The root cause, identified from the security advisory and the patch 0dbb92dd2bcf9a32379d11c0f11ed016669dae3e, is that the code path for .tar.bz2 files in src/agents/skills-install-download.ts implemented its own extraction logic by shelling out to tar. This custom logic lacked the robust security checks present in the project's centralized archive extractor.
The analysis of the patch shows that the extractArchive function in src/agents/skills-install-download.ts was the site of the vulnerability. The original code performed minimal pre-flight checks, only looking for symbolic links, while ignoring other dangerous archive entries (like FIFOs) and failing to enforce file size limits. This allowed a malicious archive to cause a DoS.
The patch rectifies this by significantly hardening the pre-flight checks. It introduces new logic to parse detailed metadata from tar's verbose output, reuses a centralized createTarEntrySafetyChecker to validate each entry's type and size against security policies, and adds a TOCTOU (Time-of-Check to Time-of-Use) check by hashing the archive file before and after the safety validation to ensure it hasn't been modified in-between.
The two key functions identified are extractArchive, which contained the flawed logic, and installDownloadSkill, which is the higher-level API function that initiates the vulnerable process. Both would be present in a runtime profile during exploitation.