Summary
The Lobster extension tool execution path used a Windows shell fallback (shell: true) after spawn failures (EINVAL/ENOENT). In that fallback path, shell metacharacters in command arguments can be interpreted by the shell, enabling command injection.
Affected Packages / Versions
- Package:
openclaw (npm)
- Affected versions:
<= 2026.2.17
- Latest confirmed affected published version:
2026.2.17
- Patched version:
2026.2.19
Technical Details
In affected releases (including v2026.2.17), extensions/lobster/src/lobster-tool.ts retried subprocess launch with shell: true on Windows for EINVAL/ENOENT spawn errors. The fix removes shell fallback and resolves Windows wrappers to explicit executable/script argv execution.
Fix Commit(s)
ba7be018da354ea9f803ed356d20464df0437916
OpenClaw thanks @allsmog for reporting.
References
Summary
The Lobster extension tool execution path used a Windows shell fallback (
shell: true) after spawn failures (EINVAL/ENOENT). In that fallback path, shell metacharacters in command arguments can be interpreted by the shell, enabling command injection.Affected Packages / Versions
openclaw(npm)<= 2026.2.172026.2.172026.2.19Technical Details
In affected releases (including
v2026.2.17),extensions/lobster/src/lobster-tool.tsretried subprocess launch withshell: trueon Windows forEINVAL/ENOENTspawn errors. The fix removes shell fallback and resolves Windows wrappers to explicit executable/script argv execution.Fix Commit(s)
ba7be018da354ea9f803ed356d20464df0437916OpenClaw thanks @allsmog for reporting.
References