Let's be clear about what happened. A single OpenClaw maintainer — jacobtomlinson — spent one day systematically closing security gaps across the project's gateway layer and seven messaging integrations: Telegram, Discord, Matrix, Google Chat, Feishu, Synology Chat, and BlueBubbles. The patches range from rate-limiting brute-force webhook auth attempts to preventing silent privilege escalation on backend reconnects.
None of these were theoretical. The gateway allowed bearer tokens to kill arbitrary sessions remotely. Backend devices could reconnect with operator.admin scope after being paired with only operator.read. Webhook endpoints on Telegram, Synology, and BlueBubbles had no rate limiting on authentication attempts — an attacker could brute-force webhook secrets at line speed. Google Chat accepted mutable display names as routing keys, meaning a renamed group could hijack message delivery.
The Gateway: Five Doors Quietly Locked
The five gateway PRs share a common theme: OpenClaw was trusting callers to identify themselves honestly, and jacobtomlinson decided to stop. The most critical fix — PR #55308 — removes a canBearerTokenKillSessions() helper that let any valid bearer token terminate remote sessions. The replacement requires an explicit x-openclaw-requester-session-key header proving ownership. Local loopback requests are still trusted. Remote ones are not.
PR #55286 is arguably worse in implication. Backend-labeled devices could reconnect requesting broader scopes than their stored pairing baseline — and the system accepted it. The fix deletes a shouldSkipBackendSelfPairing helper function entirely. The name alone tells you the problem: the system had a function whose purpose was to skip security checks for a class of clients.