OpenClaw Slack: dmPolicy=open allowed any DM sender to run privileged slash commands
Moderate severity
GitHub Reviewed
Published
Feb 15, 2026
in
openclaw/openclaw
•
Updated Feb 18, 2026
Description
Published to the GitHub Advisory Database
Feb 18, 2026
Reviewed
Feb 18, 2026
Last updated
Feb 18, 2026
Summary
When Slack DMs are configured with
dmPolicy=open, the Slack slash-command handler incorrectly treated any DM sender as command-authorized. This allowed any Slack user who could DM the bot to execute privileged slash commands via DM, bypassing intended allowlist/access-group restrictions.Affected Packages / Versions
openclaw(npm)<= 2026.2.13channels.slack.dm.policy: open(akadmPolicy=open)Impact
Any Slack user in the workspace who can DM the bot could invoke privileged slash commands via DM.
Fix
The slash-command path now computes
CommandAuthorizedfor DMs using the same allowlist/access-group gating logic as other inbound paths.Fix commit(s):
Release Process Note
patched_versionsis set to the planned next release (2026.2.14). Once that npm release is published, this advisory should be published.Thanks @christos-eth for reporting.
References