Skip to content

chore(deps): update 1panel/openclaw docker tag to v2026.4.2#7254

Open
renovate[bot] wants to merge 2 commits intodevfrom
renovate/1panel-openclaw-2026.x
Open

chore(deps): update 1panel/openclaw docker tag to v2026.4.2#7254
renovate[bot] wants to merge 2 commits intodevfrom
renovate/1panel-openclaw-2026.x

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate bot commented Apr 2, 2026

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Update Change
1panel/openclaw (source) minor 2026.3.282026.4.2

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

openclaw/openclaw (1panel/openclaw)

v2026.4.2

Compare Source

Breaking
  • Plugins/xAI: move x_search settings from the legacy core tools.web.x_search.* path to the plugin-owned plugins.entries.xai.config.xSearch.* path, standardize x_search auth on plugins.entries.xai.config.webSearch.apiKey / XAI_API_KEY, and migrate legacy config with openclaw doctor --fix. (#​59674) Thanks @​vincentkoc.
  • Plugins/web fetch: move Firecrawl web_fetch config from the legacy core tools.web.fetch.firecrawl.* path to the plugin-owned plugins.entries.firecrawl.config.webFetch.* path, route web_fetch fallback through the new fetch-provider boundary instead of a Firecrawl-only core branch, and migrate legacy config with openclaw doctor --fix. (#​59465) Thanks @​vincentkoc.
Changes
  • Tasks/Task Flow: restore the core Task Flow substrate with managed-vs-mirrored sync modes, durable flow state/revision tracking, and openclaw tasks flow inspection/recovery primitives so background orchestration can persist and be operated separately from plugin authoring layers. (#​58930) Thanks @​mbelinky.
  • Tasks/Task Flow: add managed child task spawning plus sticky cancel intent, so external orchestrators can stop scheduling immediately and let parent Task Flows settle to cancelled once active child tasks finish. (#​59610) Thanks @​mbelinky.
  • Plugins/Task Flow: add a bound api.runtime.taskFlow seam so plugins and trusted authoring layers can create and drive managed Task Flows from host-resolved OpenClaw context without passing owner identifiers on each call. (#​59622) Thanks @​mbelinky.
  • Android/assistant: add assistant-role entrypoints plus Google Assistant App Actions metadata so Android can launch OpenClaw from the assistant trigger and hand prompts into the chat composer. (#​59596) Thanks @​obviyus.
  • Exec defaults: make gateway/node host exec default to YOLO mode by requesting security=full with ask=off, and align host approval-file fallbacks plus docs/doctor reporting with that no-prompt default.
  • Providers/runtime: add provider-owned replay hook surfaces for transcript policy, replay cleanup, and reasoning-mode dispatch. (#​59143) Thanks @​jalehman.
  • Plugins/hooks: add before_agent_reply so plugins can short-circuit the LLM with synthetic replies after inline actions. (#​20067) Thanks @​JoshuaLelon.
  • Channels/session routing: move provider-specific session conversation grammar into plugin-owned session-key surfaces, preserving Telegram topic routing and Feishu scoped inheritance across bootstrap, model override, restart, and tool-policy paths.
  • Feishu/comments: add a dedicated Drive comment-event flow with comment-thread context resolution, in-thread replies, and feishu_drive comment actions for document collaboration workflows. (#​58497) Thanks @​wittam-01.
  • Matrix/plugin: emit spec-compliant m.mentions metadata across text sends, media captions, edits, poll fallback text, and action-driven edits so Matrix mentions notify reliably in clients like Element. (#​59323) Thanks @​gumadeiras.
  • Diffs: add plugin-owned viewerBaseUrl so viewer links can use a stable proxy/public origin without passing baseUrl on every tool call. (#​59341) Related #​59227. Thanks @​gumadeiras.
  • Agents/compaction: resolve agents.defaults.compaction.model consistently for manual /compact and other context-engine compaction paths, so engine-owned compaction uses the configured override model across runtime entrypoints. (#​56710) Thanks @​oliviareid-svg.
  • Agents/compaction: add agents.defaults.compaction.notifyUser so the 🧹 Compacting context... start notice is opt-in instead of always being shown. (#​54251) Thanks @​oguricap0327.
  • WhatsApp/reactions: add reactionLevel guidance for agent reactions. Thanks @​mcaxtr.
  • Exec approvals/channels: auto-enable DM-first native chat approvals when supported channels can infer approvers from existing owner config, while keeping channel fanout explicit and clarifying forwarding versus native approval client config.
Fixes
  • Providers/transport policy: centralize request auth, proxy, TLS, and header shaping across shared HTTP, stream, and websocket paths, block insecure TLS/runtime transport overrides, and keep proxy-hop TLS separate from target mTLS settings. (#​59682) Thanks @​vincentkoc.
  • Providers/Copilot: classify native GitHub Copilot API hosts in the shared provider endpoint resolver and harden token-derived proxy endpoint parsing so Copilot base URL routing stays centralized and fails closed on malformed hints. (#​59644) Thanks @​vincentkoc.
  • Providers/streaming headers: centralize default and attribution header merging across OpenAI websocket, embedded-runner, and proxy stream paths so provider-specific headers stay consistent and caller overrides only win where intended. (#​59542) Thanks @​vincentkoc.
  • Providers/media HTTP: centralize base URL normalization, default auth/header injection, and explicit header override handling across shared OpenAI-compatible audio, Deepgram audio, Gemini media/image, and Moonshot video request paths. (#​59469) Thanks @​vincentkoc.
  • Providers/OpenAI-compatible routing: centralize native-vs-proxy request policy so hidden attribution and related OpenAI-family defaults only apply on verified native endpoints across stream, websocket, and shared audio HTTP paths. (#​59433) Thanks @​vincentkoc.
  • Providers/Anthropic routing: centralize native-vs-proxy endpoint classification for direct Anthropic service_tier handling so spoofed or proxied hosts do not inherit native Anthropic defaults. (#​59608) Thanks @​vincentkoc.
  • Gateway/exec loopback: restore legacy-role fallback for empty paired-device token maps and allow silent local role upgrades so local exec and node clients stop failing with pairing-required errors after 2026.3.31. (#​59092) Thanks @​openperf.
  • Agents/subagents: pin admin-only subagent gateway calls to operator.admin while keeping agent at least privilege, so sessions_spawn no longer dies on loopback scope-upgrade pairing with close(1008) "pairing required". (#​59555) Thanks @​openperf.
  • Exec approvals/config: strip invalid security, ask, and askFallback values from ~/.openclaw/exec-approvals.json during normalization so malformed policy enums fall back cleanly to the documented defaults instead of corrupting runtime policy resolution. (#​59112) Thanks @​openperf.
  • Exec approvals/doctor: report host policy sources from the real approvals file path and ignore malformed host override values when attributing effective policy conflicts. (#​59367) Thanks @​gumadeiras.
  • Exec/runtime: treat tools.exec.host=auto as routing-only, keep implicit no-config exec on sandbox when available or gateway otherwise, and reject per-call host overrides that would bypass the configured sandbox or host target. (#​58897) Thanks @​vincentkoc.
  • Slack/mrkdwn formatting: add built-in Slack mrkdwn guidance in inbound context so Slack replies stop falling back to generic Markdown patterns that render poorly in Slack. (#​59100) Thanks @​jadewon.
  • WhatsApp/presence: send unavailable presence on connect in self-chat mode so personal-phone users stop losing all push notifications while the gateway is running. (#​59410) Thanks @​mcaxtr.
  • WhatsApp/media: add HTML, XML, and CSS to the MIME map and fall back gracefully for unknown media types instead of dropping the attachment. (#​51562) Thanks @​bobbyt74.
  • Matrix/onboarding: restore guided setup in openclaw channels add and openclaw configure --section channels, while keeping custom plugin wizards on the shared setupWizard seam. (#​59462) Thanks @​gumadeiras.
  • Matrix/streaming: keep live partial previews for the current assistant block while preserving completed block updates as separate messages when channels.matrix.blockStreaming is enabled. (#​59384) Thanks @​gumadeiras.
  • Feishu/comment threads: harden document comment-thread delivery so whole-document comments fall back to add_comment, delayed reply lookups retry more reliably, and user-visible replies avoid reasoning/planning spillover. (#​59129) Thanks @​wittam-01.
  • MS Teams/streaming: strip already-streamed text from fallback block delivery when replies exceed the 4000-character streaming limit so long responses stop duplicating content. (#​59297) Thanks @​bradgroux.
  • Slack/thread context: filter thread starter and history by the effective conversation allowlist without dropping valid open-room, DM, or group DM context. (#​58380) Thanks @​jacobtomlinson.
  • Mattermost/probes: route status probes through the SSRF guard and honor allowPrivateNetwork so connectivity checks stay safe for self-hosted Mattermost deployments. (#​58529) Thanks @​mappel-nv.
  • Zalo/webhook replay: scope replay dedupe key by chat and sender so reused message IDs across different chats or senders no longer collide, and harden metadata reads for partially missing payloads. (#​58444)
  • QQBot/structured payloads: restrict local file paths to QQ Bot-owned media storage, block traversal outside that root, reduce path leakage in logs, and keep inline image data URLs working. (#​58453) Thanks @​jacobtomlinson.
  • Image generation/providers: route OpenAI, MiniMax, and fal image requests through the shared provider HTTP transport path so custom base URLs, guarded private-network routing, and provider request defaults stay aligned with the rest of provider HTTP. Thanks @​vincentkoc.
  • Image generation/providers: stop inferring private-network access from configured OpenAI, MiniMax, and fal image base URLs, and cap shared HTTP error-body reads so hostile or misconfigured endpoints fail closed without relaxing SSRF policy or buffering unbounded error payloads. Thanks @​vincentkoc.
  • Browser/host inspection: keep static Chrome inspection helpers out of the activated browser runtime so openclaw doctor browser and related checks do not eagerly load the bundled browser plugin. (#​59471) Thanks @​vincentkoc.
  • Browser/CDP: normalize trailing-dot localhost absolute-form hosts before loopback checks so remote CDP websocket URLs like ws://localhost.:... rewrite back to the configured remote host. (#​59236) Thanks @​mappel-nv.
  • Agents/output sanitization: strip namespaced antml:thinking blocks from user-visible text so Anthropic-style internal monologue tags do not leak into replies. (#​59550) Thanks @​obviyus.
  • Kimi Coding/tools: normalize Anthropic tool payloads into the OpenAI-compatible function shape Kimi Coding expects so tool calls stop losing required arguments. (#​59440) Thanks @​obviyus.
  • Image tool/paths: resolve relative local media paths against the agent workspaceDir instead of process.cwd() so inputs like inbox/receipt.png pass the local-path allowlist reliably. (#​57222) Thanks Priyansh Gupta.
  • Podman/launch: remove noisy container output from scripts/run-openclaw-podman.sh and align the Podman install guidance with the quieter startup flow. (#​59368) Thanks @​sallyom.
  • Plugins/runtime: keep LINE reply directives and browser-backed cleanup/reset flows working even when those plugins are disabled while tightening bundled plugin activation guards. (#​59412) Thanks @​vincentkoc.
  • ACP/gateway reconnects: keep ACP prompts alive across transient websocket drops while still failing boundedly when reconnect recovery does not complete. (#​59473) Thanks @​obviyus.
  • ACP/gateway reconnects: reject stale pre-ack ACP prompts after reconnect grace expiry so callers fail cleanly instead of hanging indefinitely when the gateway never confirms the run.
  • Gateway/session kill: enforce HTTP operator scopes on session kill requests and gate authorization before session lookup so unauthenticated callers cannot probe session existence. (#​59128) Thanks @​jacobtomlinson.
  • MS Teams/logging: format non-Error failures with the shared unknown-error helper so logs stop collapsing caught SDK or Axios objects into [object Object]. (#​59321) Thanks @​bradgroux.
  • Channels/setup: ignore untrusted workspace channel plugins during setup resolution so a shadowing workspace plugin cannot override built-in channel setup/login flows unless explicitly trusted in config. (#​59158) Thanks @​mappel-nv.
  • Exec/Windows: restore allowlist enforcement with quote-aware argPattern matching across gateway and node exec, and surface accurate dynamic pre-approved executable hints in the exec tool description. (#​56285) Thanks @​kpngr.
  • Gateway: prune empty node-pending-work state entries after explicit acknowledgments and natural expiry so the per-node state map no longer grows indefinitely. (#​58179) Thanks @​gavyngong.
  • Webhooks/secret comparison: replace ad-hoc timing-safe secret comparisons across BlueBubbles, Feishu, Mattermost, Telegram, Twilio, and Zalo webhook handlers with the shared safeEqualSecret helper and reject empty auth tokens in BlueBubbles. (#​58432) Thanks @​eleqtrizit.
  • OpenShell/mirror: constrain remoteWorkspaceDir and remoteAgentWorkspaceDir to the managed /sandbox and /agent roots, and keep mirror sync from overwriting or removing user-added shell roots during config synchronization. (#​58515) Thanks @​eleqtrizit.
  • Plugins/activation: preserve explicit, auto-enabled, and default activation provenance plus reason metadata across CLI, gateway bootstrap, and status surfaces so plugin enablement state stays accurate after auto-enable resolution. (#​59641) Thanks @​vincentkoc.
  • Exec/env: block additional host environment override pivots for package roots, language runtimes, compiler include paths, and credential/config locations so request-scoped exec cannot redirect trusted toolchains or config lookups. (#​59233) Thanks @​drobison00.
  • Dotenv/workspace overrides: block workspace .env files from overriding OPENCLAW_PINNED_PYTHON and OPENCLAW_PINNED_WRITE_PYTHON so trusted helper interpreters cannot be redirected by repo-local env injection. (#​58473) Thanks @​eleqtrizit.
  • Plugins/install: accept JSON5 syntax in openclaw.plugin.json and bundle plugin.json manifests during install/validation, so third-party plugins with trailing commas, comments, or unquoted keys no longer fail to install. (#​59084) Thanks @​singleGanghood.
  • Telegram/exec approvals: rewrite shared /approve … allow-always callback payloads to /approve … always before Telegram button rendering so plugin approval IDs still fit Telegram's callback_data limit and keep the Allow Always action visible. (#​59217) Thanks @​jameslcowan.
  • Cron/exec timeouts: surface timed-out exec and bash failures in isolated cron runs even when verbose: off, including custom session-target cron jobs, so scheduled runs stop failing silently. (#​58247) Thanks @​skainguyen1412.
  • Telegram/exec approvals: fall back to the origin session key for async approval followups and keep resume-failure status delivery sanitized so Telegram followups still land without leaking raw exec metadata. (#​59351) Thanks @​seonang.
  • Node-host/exec approvals: bind pnpm dlx invocations through the approval planner's mutable-script path so the effective runtime command is resolved for approval instead of being left unbound. (#​58374)
  • Exec/node hosts: stop forwarding the gateway workspace cwd to remote node exec when no workdir was explicitly requested, so cross-platform node approvals fall back to the node default cwd instead of failing with SYSTEM_RUN_DENIED. (#​58977) Thanks @​Starhappysh.
  • Exec approvals/channels: decouple initiating-surface approval availability from native delivery enablement so Telegram, Slack, and Discord still expose approvals when approvers exist and native target routing is configured separately. (#​59776) Thanks @​joelnishanth.
  • Plugins/runtime: reuse compatible active registries for web_search and web_fetch provider snapshot resolution so repeated runtime reads do not re-import the same bundled plugin set on each agent message. Related #​48380.

v2026.4.1

Compare Source

Changes
  • macOS/Voice Wake: add the Voice Wake option to trigger Talk Mode. (#​58490) Thanks @​SmoothExec.
  • Tasks/chat: add /tasks as a chat-native background task board for the current session, with recent task details and agent-local fallback counts when no linked tasks are visible. Related #​54226. Thanks @​vincentkoc.
  • Web search/SearXNG: add the bundled SearXNG provider plugin for web_search with configurable host support. (#​57317) Thanks @​cgdusek.
  • Telegram/errors: add configurable errorPolicy and errorCooldownMs controls so Telegram can suppress repeated delivery errors per account, chat, and topic without muting distinct failures. (#​51914) Thanks @​chinar-amrutkar
  • Gateway/webchat: make chat.history text truncation configurable with gateway.webchat.chatHistoryMaxChars and per-request maxChars, while preserving silent-reply filtering and existing default payload limits. (#​58900)
  • Amazon Bedrock/Guardrails: add Bedrock Guardrails support to the bundled provider. (#​58588) Thanks @​MikeORed.
  • ZAI/models: add glm-5.1 and glm-5v-turbo to the bundled Z.AI provider catalog. (#​58793) Thanks @​tomsun28
  • Agents/default params: add agents.defaults.params for global default provider parameters. (#​58548) Thanks @​lpender.
  • Agents/failover: cap prompt-side and assistant-side same-provider auth-profile retries for rate-limit failures before cross-provider model fallback, add the auth.cooldowns.rateLimitedProfileRotations knob, and document the new fallback behavior. (#​58707) Thanks @​Forgely3D
  • Agents/compaction: resolve agents.defaults.compaction.model consistently for manual /compact and other context-engine compaction paths, so engine-owned compaction uses the configured override model across runtime entrypoints. (#​56710) Thanks @​oliviareid-svg
  • Cron/tools allowlist: add openclaw cron --tools for per-job tool allowlists. (#​58504) Thanks @​andyk-ms.
Fixes
  • Chat/error replies: stop leaking raw provider/runtime failures into external chat channels, return a friendly retry message instead, and add a specific /new hint for Bedrock toolResult/toolUse session mismatches. (#​58831) Thanks @​ImLukeF.
  • Sessions/model switching: keep /model changes queued behind busy runs instead of interrupting the active turn, and retarget queued followups so later work picks up the new model as soon as the current turn finishes.
  • Web UI/OpenResponses: preserve rewritten stream snapshots in webchat and keep OpenResponses final streamed text aligned when models rewind earlier output. (#​58641) Thanks @​neeravmakwana
  • Discord/inbound media: pass Discord attachment and sticker downloads through the shared idle-timeout and worker-abort path so slow or stuck inbound media fetches stop hanging message processing. (#​58593) Thanks @​aquaright1
  • Telegram/retries: keep non-idempotent sends on the strict safe-send path, retry wrapped pre-connect failures, and preserve 429 / retry_after backoff for safe delivery retries. (#​51895) Thanks @​chinar-amrutkar
  • Telegram/exec approvals: route topic-aware exec approval followups through Telegram-owned threading and approval-target parsing, so forum-topic approvals stay in the originating topic instead of falling back to the root chat. (#​58783)
  • Telegram/local Bot API: preserve media MIME types for absolute-path downloads so local audio files still trigger transcription and other MIME-based handling. (#​54603) Thanks @​jzakirov
  • Channels/WhatsApp: pass inbound message timestamp to model context so the AI can see when WhatsApp messages were sent. (#​58590) Thanks @​Maninae
  • QQBot/voice: lazy-load silk-wasm in audio-convert.ts so qqbot still starts when the optional voice dependency is missing, while voice encode/decode degrades gracefully instead of crashing at module load time. (#​58829) Thanks @​WideLee.

v2026.3.31

Compare Source

Breaking
  • Nodes/exec: remove the duplicated nodes.run shell wrapper from the CLI and agent nodes tool so node shell execution always goes through exec host=node, keeping node-specific capabilities on nodes invoke and the dedicated media/location/notify actions.
  • Plugin SDK: deprecate the legacy provider compat subpaths plus the older bundled provider setup and channel-runtime compatibility shims, emit migration warnings, and keep the current documented openclaw/plugin-sdk/* entrypoints plus local api.ts / runtime-api.ts barrels as the forward path ahead of a future major-release removal.
  • Skills/install and Plugins/install: built-in dangerous-code critical findings and install-time scan failures now fail closed by default, so plugin installs and gateway-backed skill dependency installs that previously succeeded may now require an explicit dangerous override such as --dangerously-force-unsafe-install to proceed.
  • Gateway/auth: trusted-proxy now rejects mixed shared-token configs, and local-direct fallback requires the configured token instead of implicitly authenticating same-host callers. Thanks @​zhangning-agent, @​jacobtomlinson, and @​vincentkoc.
  • Gateway/node commands: node commands now stay disabled until node pairing is approved, so device pairing alone is no longer enough to expose declared node commands. (#​57777) Thanks @​jacobtomlinson.
  • Gateway/node events: node-originated runs now stay on a reduced trusted surface, so notification-driven or node-triggered flows that previously relied on broader host/session tool access may need adjustment. (#​57691) Thanks @​jacobtomlinson.
Changes
  • ACP/plugins: add an explicit default-off ACPX plugin-tools MCP bridge config, document the trust boundary, and harden the built-in bridge packaging/logging path so global installs and stdio MCP sessions work reliably. (#​56867) Thanks @​joe2643.
  • Agents/LLM: add a configurable idle-stream timeout for embedded runner requests so stalled model streams abort cleanly instead of hanging until the broader run timeout fires. (#​55072) Thanks @​liuy.
  • Docs/plugins: update the community wecom and qqbot plugin listing to the docs catalog. (#​57641) Thanks @​sliverp.
  • Agents/MCP: materialize bundle MCP tools with provider-safe names (serverName__toolName), support optional streamable-http transport selection plus per-server connection timeouts, and preserve real tool results from aborted/error turns unless truncation explicitly drops them. (#​49505) Thanks @​ziomancer.
  • Android/notifications: add notification-forwarding controls with package filtering, quiet hours, rate limiting, and safer picker behavior for forwarded notification events. (#​40175) Thanks @​nimbleenigma.
  • Background tasks: turn tasks into a real shared background-run control plane instead of ACP-only bookkeeping by unifying ACP, subagent, cron, and background CLI execution under one SQLite-backed ledger, routing detached lifecycle updates through the executor seam, adding audit/maintenance/status visibility, tightening auto-cleanup and lost-run recovery, improving task awareness in internal status/tool surfaces, and clarifying the split between heartbeat/main-session automation and detached scheduled runs. Thanks @​mbelinky and @​vincentkoc.
  • Background tasks: add the first linear task flow control surface with openclaw tasks list|show|cancel, keep manual multi-task flows separate from one-task auto-sync flows, and surface doctor recovery hints for obviously orphaned or broken flow/task linkage. Thanks @​mbelinky and @​vincentkoc.
  • Channels/QQ Bot: add QQ Bot as a bundled channel plugin with multi-account setup, SecretRef-aware credentials, slash commands, reminders, and media send/receive support. (#​52986) Thanks @​sliverp.
  • Diffs: skip unused viewer-versus-file SSR preload work so diffs view-only and file-only runs do less render work while keeping mode outputs aligned. (#​57909) thanks @​gumadeiras.
  • Tasks: add a minimal SQLite-backed task flow registry plus task-to-flow linkage scaffolding, so orchestrated work can start gaining a first-class parent record without changing current task delivery behavior. Thanks @​mbelinky and @​vincentkoc.
  • Tasks: persist blocked state on one-task task flows and let the same flow reopen cleanly on retry, so blocked detached work can carry a parent-level reason and continue without fragmenting into a new job. Thanks @​mbelinky and @​vincentkoc.
  • Tasks: route one-task ACP and subagent updates through a parent task-flow owner context, so detached work can emerge back through the intended parent thread/session instead of speaking only as a raw child task. Thanks @​mbelinky and @​vincentkoc.
  • LINE/outbound media: add LINE image, video, and audio outbound sends on the LINE-specific delivery path, including explicit preview/tracking handling for videos while keeping generic media sends on the existing image-only route. (#​45826) Thanks @​masatohoshino.
  • Matrix/history: add optional room history context for Matrix group triggers via channels.matrix.historyLimit, with per-agent watermarks and retry-safe snapshots so failed trigger retries do not drift into newer room messages. (#​57022) thanks @​chain710.
  • Matrix/network: add explicit channels.matrix.proxy config for routing Matrix traffic through an HTTP(S) proxy, including account-level overrides and matching probe/runtime behavior. (#​56931) thanks @​patrick-yingxi-pan.
  • Matrix/streaming: add draft streaming so partial Matrix replies update the same message in place instead of sending a new message for each chunk. (#​56387) Thanks @​jrusz.
  • Matrix/threads: add per-DM threadReplies overrides and keep thread session isolation aligned with the effective room or DM thread policy from the triggering message onward. (#​57995) thanks @​teconomix.
  • MCP: add remote HTTP/SSE server support for mcp.servers URL configs, including auth headers and safer config redaction for MCP credentials. (#​50396) Thanks @​dhananjai1729.
  • Memory/QMD: add per-agent memorySearch.qmd.extraCollections so agents can opt into cross-agent session search without flattening every transcript collection into one shared QMD namespace. Thanks @​vincentkoc.
  • Microsoft Teams/member info: add a Graph-backed member info action so Teams automations and tools can resolve channel member details directly from Microsoft Graph. (#​57528) Thanks @​sudie-codes.
  • Nostr/inbound DMs: verify inbound event signatures before pairing or sender-authorization side effects, so forged DM events no longer create pairing requests or trigger reply attempts. Thanks @​smaeljaish771 and @​vincentkoc.
  • OpenAI/Responses: forward configured text.verbosity across Responses HTTP and WebSocket transports, surface it in /status, and keep per-agent verbosity precedence aligned with runtime behavior. (#​47106) Thanks @​merc1305 and @​vincentkoc.
  • Pi/Codex: add native Codex web search support for embedded Pi runs, including config/docs/wizard coverage and managed-tool suppression when native Codex search is active. (#​46579) Thanks @​Evizero.
  • Slack/exec approvals: add native Slack approval routing and approver authorization so exec approval prompts can stay in Slack instead of falling back to the Web UI or terminal. Thanks @​vincentkoc.
  • TTS: Add structured provider diagnostics and fallback attempt analytics. (#​57954) Thanks @​joshavant.
  • WhatsApp/reactions: agents can now react with emoji on incoming WhatsApp messages, enabling more natural conversational interactions like acknowledging a photo with ❤️ instead of typing a reply. Thanks @​mcaxtr.
  • Agents/BTW: force /btw side questions to disable provider reasoning so Anthropic adaptive-thinking sessions stop failing with No BTW response generated. Fixes #​55376. Thanks @​Catteres and @​vincentkoc.
  • CLI/onboarding: reset the remote gateway URL prompt to the safe loopback default after declining a discovered endpoint, so onboarding does not keep a previously rejected remote URL. (#​57828)
  • Agents/exec defaults: honor per-agent tools.exec defaults when no inline directive or session override is present, so configured exec host, security, ask, and node settings actually apply. (#​57689)
  • Sandbox/networking: sanitize SSH subprocess env vars through the shared sandbox policy and route marketplace archive downloads plus Ollama discovery, auth, and pull requests through the guarded fetch path so sandboxed execution and remote fetches follow the repo's trust boundaries. (#​57848, #​57850)
Fixes
  • Slack: stop retry-driven duplicate replies when draft-finalization edits fail ambiguously, and log configured allowlisted users/channels by readable name instead of raw IDs.
  • Agents/OpenAI Responses: normalize raw bundled MCP tool schemas on the WebSocket/Responses path so bare-object, object-ish, and top-level union MCP tools no longer get rejected by OpenAI during tool registration. (#​58299) Thanks @​yelog.
  • ACP/security: replace ACP's dangerous-tool name override with semantic approval classes, so only narrow readonly reads/searches can auto-approve while indirect exec-capable and control-plane tools always require explicit prompt approval. Thanks @​vincentkoc.
  • ACP: derive owner-only approval classes from the shared tool-policy fallback map so cron, nodes, and whatsapp_login cannot drift out of prompt-required coverage.
  • ACP/sessions_spawn: register ACP child runs for completion tracking and lifecycle cleanup, and make registration-failure cleanup explicitly best-effort so callers do not assume an already-started ACP turn was fully aborted. (#​40885) Thanks @​xaeon2026 and @​vincentkoc.
  • ACP/tasks: mark cleanly exited ACP runs as blocked when they end on deterministic write or authorization blockers, and wake the parent session with a follow-up instead of falsely reporting success.
  • ACPX/runtime: derive the bundled ACPX expected version from the extension package metadata instead of hardcoding a separate literal, so plugin-local ACPX installs stop drifting out of health-check parity after version bumps. (#​49089) Thanks @​jiejiesks and @​vincentkoc.
  • Agents/Anthropic failover: treat Anthropic api_error payloads with An unexpected error occurred while processing the response as transient so retry/fallback can engage instead of surfacing a terminal failure. (#​57441) Thanks @​zijiess and @​vincentkoc.
  • Agents/compaction: keep late compaction-retry completions from double-resolving finished compaction futures, so interrupted or timed-out compactions stop surfacing spurious second-completion races. (#​57796) Thanks @​joshavant.
  • Agents/disabled providers: make disabled providers disappear from default model selection and embedded provider fallback, while letting explicitly pinned disabled providers fail with a clear config error instead of silently taking traffic. (#​57735) Thanks @​rileybrown-dev and @​vincentkoc.
  • Agents/OAuth output: force exec-host OAuth output readers through the gateway fs policy so embedded gateway runs stop crashing when provider auth writes land outside the current sandbox workspace. (#​58249) Thanks @​joshavant.
  • Agents/system prompt: fix agent.name interpolation in the embedded runtime system prompt and make provider/model fallback text reflect the effective runtime selection after start. (#​57625) Thanks @​StllrSvr and @​vincentkoc.
  • Android/device info: read the app's version metadata from the package manager instead of hidden APIs so Android 15+ onboarding and device info no longer fail to compile or report placeholder values. (#​58126) Thanks @​L3ER0Y.
  • Android/pairing: stop appending duplicate push receiver entries to gateway-service.conf on repeated QR pairing and keep push registration bounded to the current successful pairing, so Android push delivery stays healthy across re-pair and token rotation. (#​58256) Thanks @​surrealroad.
  • App install smoke: pin the latest-release lookup to latest, cache the first stable install version across the rerun, and relax prerelease package assertions so the Parallels smoke lane can validate stable-to-main upgrades even when beta moves ahead or the guest starts from an older stable. (#​58177) Thanks @​vincentkoc.
  • Auth/profiles: keep the last successful config load in memory for the running process and refresh that snapshot on successful writes/reloads, so hot paths stop reparsing openclaw.json between watcher-driven swaps.
  • Config/SecretRef + Control UI: harden SecretRef redaction round-trip restore, block unsafe raw fallback (force Form mode when raw is unavailable), and preflight submitted-config SecretRefs before config write RPC persistence. (#​58044) Thanks @​joshavant.
  • Config/update: stop openclaw doctor write-backs from persisting plugin-injected channel defaults, so openclaw update no longer seeds config keys that later break service refresh validation. (#​56834) Thanks @​openperf.
  • Control UI/agents: auto-load agent workspace files on initial Files panel open, and populate overview model/workspace/fallbacks from effective runtime agent metadata so defaulted models no longer show as Not set. (#​56637) Thanks @​dxsx84.
  • Control UI/slash commands: make /steer and /redirect work from the chat command palette with visible pending state for active-run /steer, correct redirected-run tracking, and a single canonical /steer entry in the command menu. (#​54625) Thanks @​fuller-stack-dev.
  • Cron/announce: preserve all deliverable text payloads for announce mode instead of collapsing to the last chunk, so multi-line cron reports deliver in full to Telegram forum topics.
  • Cron/isolated sessions: carry the full live-session provider, model, and auth-profile selection across retry restarts so cron jobs with model overrides no longer fail or loop on mid-run model-switch requests. (#​57972) Thanks @​issaba1.
  • Diffs/config: preserve schema-shaped plugin config parsing from diffsPluginConfigSchema.safeParse(), so direct callers keep defaults and security sections instead of receiving flattened tool defaults. (#​57904) Thanks @​gumadeiras.
  • Diffs: fall back to plain text when lang hints are invalid during diff render and viewer hydration, so bad or stale language values no longer break the diff viewer. (#​57902) Thanks @​gumadeiras.
  • Discord/voice: enforce the same guild channel and member allowlist checks on spoken voice ingress before transcription, so joined voice channels no longer accept speech from users outside the configured Discord access policy. Thanks @​cyjhhh and @​vincentkoc.
  • Docker/setup: force BuildKit for local image builds (including sandbox image builds) so ./docker-setup.sh no longer fails on RUN --mount=... when hosts default to Docker's legacy builder. (#​56681) Thanks @​zhanghui-china.
  • Docs/anchors: fix broken English docs links and make Mint anchor audits run against the English-source docs tree. (#​57039) thanks @​velvet-shark.
  • Doctor/plugins: skip false Matrix legacy-helper warnings when no migration plans exist, and keep bundled enabledByDefault plugins in the gateway startup set. (#​57931) Thanks @​dinakars777.
  • Exec approvals/macOS: unwrap arch and xcrun before deriving shell payloads and allow-always patterns, so wrapper approvals stay bound to the carried command instead of the outer carrier. Thanks @​tdjackey and @​vincentkoc.
  • Exec approvals: unwrap caffeinate and sandbox-exec before persisting allow-always trust so later shell payload changes still require a fresh approval. Thanks @​tdjackey and @​vincentkoc.
  • Exec/approvals: infer Discord and Telegram exec approvers from existing owner config when execApprovals.approvers is unset, extend the default approval window to 30 minutes, and clarify approval-unavailable guidance so approvals do not appear to silently disappear.
  • Pi/TUI: flush message-boundary replies at message_end so turns stop looking stuck until the next nudge when the final reply was already ready. Thanks @​vincentkoc.
  • Status/tasks: fall back to same-agent task counts in /status when the current session has no linked tasks, keeping the default view useful without exposing other sessions' task details. Thanks @​vincentkoc.
  • Status/auto-reply: stop status-only turns from replying twice when inline /status handling already produced the reply, so Discord and other chat surfaces no longer emit duplicate status cards. Thanks @​vincentkoc.
  • Exec/approvals: keep awk and sed family binaries out of the low-risk safeBins fast path, and stop doctor profile scaffolding from treating them like ordinary custom filters. Thanks @​vincentkoc.
  • Exec/env: block proxy, TLS, and Docker endpoint env overrides in host execution so request-scoped commands cannot silently reroute outbound traffic or trust attacker-supplied certificate settings. Thanks @​AntAISecurityLab.
  • Exec/env: block Python package index override variables from request-scoped host exec environment sanitization so package fetches cannot be redirected through a caller-supplied index. Thanks @​nexrin and @​vincentkoc.
  • Exec/node: stop gateway-side workdir fallback from rewriting explicit host=node cwd values to the gateway filesystem, so remote node exec approval and runs keep using the intended node-local directory. (#​50961) Thanks @​openperf.
  • Exec/runtime: default implicit exec to host=auto, resolve that target to sandbox only when a sandbox runtime exists, keep explicit host=sandbox fail-closed without sandbox, and show /exec effective host state in runtime status/docs.
  • Exec: fail closed when the implicit sandbox host has no sandbox runtime, and stop denied async approval followups from reusing prior command output from the same session. (#​56800) Thanks @​scoootscooob.
  • Feishu/groups: keep quoted replies and topic bootstrap context aligned with group sender allowlists so only allowlisted thread messages seed agent context. Thanks @​AntAISecurityLab and @​vincentkoc.
  • Gateway/attachments: offload large inbound images without leaking media:// markers into text-only runs, preserve mixed attachment order for model input/transcripts, and fail closed when model image capability cannot be resolved. (#​55513) Thanks @​Syysean.
  • Gateway/auth: keep shared-auth rate limiting active during WebSocket handshake attempts even when callers also send device-token candidates, so bogus device-token fields no longer suppress shared-secret brute-force tracking. Thanks @​kexinoh and @​vincentkoc.
  • Gateway/auth: reject mismatched browser Origin headers on trusted-proxy HTTP operator requests while keeping origin-less headless proxy clients working. Thanks @​AntAISecurityLab and @​vincentkoc.
  • Gateway/device tokens: disconnect active device sessions after token rotation so newly rotated credentials revoke existing live connections immediately instead of waiting for those sockets to close naturally. Thanks @​zsxsoft and @​vincentkoc.
  • Gateway/health: carry webhook-vs-polling account mode from channel descriptors into runtime snapshots so passive channels like LINE and BlueBubbles skip false stale-socket health failures. (#​47488) Thanks @​karesansui-u.
  • Gateway/pairing: restore QR bootstrap onboarding handoff so fresh /pair qr iPhone setup can auto-approve the initial node pairing, receive a reusable node device token, and stop retrying with spent bootstrap auth. (#​58382) Thanks [@​ngut

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Never, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@f2c-ci-robot
Copy link
Copy Markdown

f2c-ci-robot bot commented Apr 2, 2026

Adding the "do-not-merge/release-note-label-needed" label because no release-note block was detected, please follow our release note process to remove it.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@f2c-ci-robot
Copy link
Copy Markdown

f2c-ci-robot bot commented Apr 2, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@renovate renovate bot force-pushed the renovate/1panel-openclaw-2026.x branch 2 times, most recently from 96dd475 to 4218442 Compare April 3, 2026 09:33
@renovate renovate bot changed the title chore(deps): update 1panel/openclaw docker tag to v2026.4.1 chore(deps): update 1panel/openclaw docker tag to v2026.4.2 Apr 3, 2026
@renovate renovate bot force-pushed the renovate/1panel-openclaw-2026.x branch from 6117bc6 to 697f411 Compare April 4, 2026 12:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants