Description
OpenClaw before 2026.3.31 stores Nostr privateKey as plaintext in configuration, allowing exposure through config.get method calls that bypass redaction mechanisms. Attackers can retrieve unredacted configuration data to obtain plaintext signing keys used for Nostr protocol operations.
Problem types
CWE-312: Cleartext Storage of Sensitive Information
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
ccreater (@ccreater222)
KeenSecurityLab
qclawer
References
github.com/...enclaw/security/advisories/GHSA-jjw7-3vjf-fg5j (GitHub Security Advisory (GHSA-jjw7-3vjf-fg5j))
github.com/...ommit/57700d716f660591fb6e09727f3ca8041fa48b9d (Patch Commit)
www.vulncheck.com/...xposure-via-config-get-redaction-bypass (VulnCheck Advisory: OpenClaw < 2026.3.31 - Nostr Private Key Exposure via config.get Redaction Bypass)