feat(kiloclaw): bump openclaw to version 2026.3.31#1819
Open
kilo-code-bot[bot] wants to merge 1 commit intomainfrom
Open
feat(kiloclaw): bump openclaw to version 2026.3.31#1819kilo-code-bot[bot] wants to merge 1 commit intomainfrom
kilo-code-bot[bot] wants to merge 1 commit intomainfrom
Conversation
Contributor
Author
Code Review SummaryStatus: No Issues Found | Recommendation: Merge Files Reviewed (1 files)
Reviewed by gpt-5.4-20260305 · 492,747 tokens |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
openclawfrom2026.3.13to2026.3.31inkiloclaw/Dockerfile.Release notes highlights — potential deployment impact
The following changes in
v2026.3.31may affect KiloClaw deployments:Breaking: Gateway/auth —
trusted-proxyrejects mixed shared-token configsKiloClaw uses a per-user HMAC gateway token (
OPENCLAW_GATEWAY_TOKEN) and the controller sets uptrusted-proxymode. This change means any residual implicit same-host auth is no longer accepted — only the configured token is valid. If the controller's bootstrap or any runtime path relies on implicit loopback auth without a token, it will break after this upgrade. Verifycontroller/src/bootstrap.tscorrectly injectsOPENCLAW_GATEWAY_TOKENon all code paths before deploying.Breaking: Gateway/node commands — disabled until node pairing is approved
If any KiloClaw flows rely on node commands being available immediately after device pairing (before explicit node-pairing approval), those flows will silently stop working.
Breaking: Gateway/node events — node-originated runs on a reduced trusted surface
Automated node-triggered or notification-driven agent flows may have reduced tool access after this upgrade.
Breaking: Skills/install and Plugins/install — dangerous-code findings now fail closed
If any skills bundled in
kiloclaw/skills/or plugins installed at runtime trigger critical scan findings, their install will now fail instead of proceeding. Review bundled skills and plugin install flows.Security fix: Exec/env — proxy and TLS env override blocking
Positive security hardening, but could break any legitimate exec flows that set
HTTP_PROXY,HTTPS_PROXY,SSL_CERT_FILE, or similar env vars in agent-invoked commands.Verification
pnpm format:check,scripts/lint-all.sh,scripts/typecheck-all.sh --changes-onlyall green.Visual Changes
N/A
Reviewer Notes
The gateway/auth breaking change around
trusted-proxyis the highest-risk item for this deployment. Recommend verifying the controller bootstrap correctly sets the gateway token before merging and deploying. All other breaking changes are lower risk given KiloClaw's current usage patterns, but worth a smoke test viascripts/controller-smoke-test.shafter image build.