feat(kiloclaw): bump openclaw to version 2026.3.31#1843
Open
kilo-code-bot[bot] wants to merge 1 commit intomainfrom
Open
feat(kiloclaw): bump openclaw to version 2026.3.31#1843kilo-code-bot[bot] wants to merge 1 commit intomainfrom
kilo-code-bot[bot] wants to merge 1 commit intomainfrom
Conversation
Contributor
Author
Code Review SummaryStatus: No Issues Found | Recommendation: Merge Files Reviewed (1 files)
Reviewed by gpt-5.4-20260305 · 489,390 tokens |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Bumps the pinned
openclawversion inkiloclaw/Dockerfilefrom2026.3.13to2026.3.31.Verification
2026.3.13) is older than the target (2026.3.31), so the bump is required per policy.Visual Changes
N/A
Reviewer Notes
Release notes analysis — items that may affect our deployment
The following breaking changes from the v2026.3.31 release notes are worth reviewing in the context of KiloClaw:
High priority:
Gateway/auth —
trusted-proxynow rejects mixed shared-token configs, and local-direct fallback requires the configured token instead of implicitly authenticating same-host callers.Our controller (
controller/src/bootstrap.ts) patches gateway auth config and the gateway runs with--bind loopback. Verify the patched config does not inadvertently mix shared-token and trusted-proxy settings, and that same-host loopback calls still pass after this tightening.Gateway/auth —
trusted-proxymixed shared-token validation now also covers WebSocket handshake rate limiting; bogus device-token fields no longer suppress shared-secret brute-force tracking.Low direct risk but worth confirming the gateway token the controller injects (
OPENCLAW_GATEWAY_TOKEN) is not inadvertently classified as a shared-token.Medium priority:
Gateway/node commands — node commands now stay disabled until node pairing is approved; device pairing alone is no longer enough.
If any KiloClaw flows rely on node commands becoming available immediately after device pairing (e.g., automation or skill flows that assume node tools are available post-pair), those flows will now silently stall until an explicit node pairing approval step.
Gateway/node events — node-originated runs now stay on a reduced trusted surface.
Notification-driven or node-triggered flows that previously relied on broader host/session tool access may need adjustment.
Nodes/exec — the duplicated
nodes.runshell wrapper is removed from the CLI and agentnodestool; node shell execution always goes throughexec host=node.If any bundled skills or the controller trigger node shell execution via the old wrapper path, those calls will break silently.
Lower priority / informational:
criticalfindings now fail closed by default. Plugin or skill installs that previously succeeded may now require--dangerously-force-unsafe-install. Verify no automated install flows in bootstrap are affected.