The vulnerability stems from an improper authorization check in two separate command handlers within the OpenClaw application. The patch aa66ae1fc797d3298cc409ed2c5da69a89950a45 reveals that for both the /phone and /voice commands, a critical security check was incorrectly scoped. The code was intended to ensure that only users with operator.admin privileges could perform sensitive actions like arming/disarming the phone or setting the voice. However, this check was only enforced if the command originated from the webchat channel (ctx.channel === "webchat"). This meant that any user interacting with the system through an external channel (e.g., Telegram, Slack) could bypass this check and execute these administrative commands. The fix removes the channel-specific condition, making the operator.admin scope check universal for these commands, thereby closing the security hole.