The vulnerability lies in the fact that several functions responsible for creating and managing SSH-based sandboxes in OpenClaw were passing the entire, unsanitized process.env of the main application to child processes. These child processes, which execute SSH commands, would then inherit all environment variables, including potentially sensitive ones like API keys or other credentials. An attacker with the ability to inspect the environment of the sandboxed processes could exfiltrate this sensitive information. The patch addresses this by introducing a sanitizeEnvVars function that filters the environment variables, removing any that match a blocklist of sensitive patterns before they are passed to any child SSH processes. The analysis of the fix commit cfe14459531e002a1c61c27d97ec7dc8aecddc1f clearly shows the replacement of process.env with a sanitized version in functions like createOpenShellSandboxBackend, runSshSandboxCommand, and uploadDirectoryToSshTarget, confirming these as the locations of the vulnerability.