The vulnerability lies in the improper handling of environment variables from workspace .env files. An attacker could define OPENCLAW_BUNDLED_PLUGINS_DIR, OPENCLAW_BUNDLED_HOOKS_DIR, or OPENCLAW_BUNDLED_SKILLS_DIR in a .env file within a project. When the OpenClaw CLI is run within that project's directory, the loadCliDotEnv function is called, which in turn calls loadWorkspaceDotEnvFile. This function would previously load these environment variables, pointing the application to load and execute potentially malicious plugins, hooks, or skills from an attacker-controlled directory. The patch addresses this by adding these specific environment variables to a blocklist, BLOCKED_WORKSPACE_DOTENV_KEYS, which is checked within the environment loading functions to prevent them from being overridden by a workspace .env file.