The security advisory GHSA-ff98-w8hj-qrxf is not about a typical vulnerability but a clarification of the security model regarding OpenClaw plugins. The associated commit 2e421f32dfc589c02706265fd3c3137ffc06c4b1 reverts a previous security hardening measure that disabled OS command execution from plugins by default.
The analysis of the patch shows that the createPluginRuntime function in src/plugins/runtime/index.ts was modified to remove a protective wrapper (runtimeCommandExecutionGuarded) around the runCommandWithTimeout function. Previously, this wrapper would prevent runCommandWithTimeout from being called unless a specific configuration, plugins.runtime.allowLegacyExec, was set to true.
By removing this guard, the runCommandWithTimeout function, which allows the execution of arbitrary OS commands, is now directly exposed to any installed plugin by default. While the advisory frames this as a trust boundary clarification—placing the onus on users to only install trusted plugins—it means that a malicious plugin can trivially gain code execution on the host system by calling runtime.system.runCommandWithTimeout. The runCommandWithTimeout function would be the primary indicator in a runtime profile during such an exploitation event.