All News
Opinion10 PRs Reviewed

OpenClaw Shipped Ten Fixes in One Day. Every One Should Embarrass Them.

I read every commit from March 22. Not one PR added a feature. All ten fixed things that should have worked from the start. The velocity is impressive. The fact that it was necessary is damning.

March 22, 20267 min read

Let me tell you what a healthy open-source project looks like on its busiest day. It ships features. It closes long-running discussions. It publishes a release with a changelog that makes contributors feel good about their weekend.

Now let me tell you what OpenClaw did on March 22, 2026. It merged ten pull requests from eight contributors. Zero new features. Zero enhancements. Ten repairs to things that should have been working all along. An API that silently ate developer tools. A CI pipeline testing against empty directories. A session system that didn't understand the word “current.” Discord agents that couldn't be killed when users walked away.

I've covered tech companies that ship broken products and call them MVPs. I've watched platforms gaslight developers into blaming their own code. What I saw in OpenClaw's commit log on March 22 is something different and, honestly, more concerning: a project with 150,000 GitHub stars that has been silently failing its users for months, and the only reason we know is because a handful of contributors decided to fix it all at once.

The Docket

Ten pull requests. Here's what each one tells you about the state of this project.

1
#52171API silently dropped every custom toolby CharZhou

One missing parameter. Every agent tool silently discarded. The downstream handler was perfect — it was never called.

Critical
2
#52148Discord abort signals never forwarded to ACPby dutifulbob

When Discord workers timed out, the ACP sessions kept running. In the background. Burning compute. For hours.

High
3
#39574session_status didn't recognize 'current'by BryanTegomoh

The most basic session query — 'what session am I in?' — threw errors. Took 13 days of review to merge a fix.

Medium
4
#52082Cold startup imported 169 MB for a text replyby vincentkoc

The inbound reply path loaded the entire plugin graph at import time. 169 MB. To process a text message.

Critical
5
#52077models.json rebuilt from scratch every turnby vincentkoc

Every embedded agent run re-validated the model catalog. 5 seconds of wasted I/O per turn. Cached result: 565 ms.

High
6
#52279macOS CI couldn't build the test targetby Takhoffman

The CI job was running tests against empty dependencies. On macOS. For months. Nobody noticed.

Medium
7
#52267plugin-sdk tests ran without hydrated distby Takhoffman

Same contributor, same afternoon, same class of bug. The plugin-sdk lane was testing against nothing.

Medium
8
#51974Agents couldn't remember their own defaultsby vincentkoc

In a multi-agent system, each agent couldn't enforce its own thinking/reasoning preferences. Fourteen months after multi-agent launched.

High
9
#51950Discord dedup guard ate messages after failuresby Takhoffman

The deduplication guard marked messages as 'seen' before processing them. If processing failed, the message was gone forever.

High
10
#52193Gateway test suite was itself brokenby ImLukeF

48 failing tests across 13 files. The safety net had holes. PRs were merging through those holes daily.

Medium

The Pattern Nobody Wants to Name

I count three categories here, and none of them are “oops, edge case.”

3

Silent data loss bugs

Tools dropped. Messages eaten. Sessions misidentified. All returned 200 OK.

4

CI / testing failures

macOS lane empty. Plugin SDK lane empty. 48 gateway tests red. The safety net was decorative.

3

Performance time-bombs

169 MB cold imports. 5s model rebuild per turn. Zombie agents burning cycles.

Here's my question for the OpenClaw maintainers, and I'm asking it sincerely: where was the observability? Three silent data loss bugs means no alerting on tool-call success rates, no monitoring of session resolution failures, no dedup metrics. Three performance bombs means nobody had a cold-start dashboard. Four testing gaps means the CI pipeline was a green checkmark factory.

This is a project that accepts enterprise contributions from Baidu. That powers WhatsApp bots for businesses. That runs Discord agents for communities with thousands of members. And until March 22, its API was silently lobotomizing every tool-using agent that called the /v1/responses endpoint.

“The scariest bugs aren't the ones that crash. They're the ones that succeed quietly, return 200 OK, and let your users blame themselves.”

Credit Where It's Due

I want to be clear about something. The people who fixed these bugs — CharZhou, dutifulbob, BryanTegomoh, vincentkoc, Takhoffman, ImLukeF — did excellent work. The fixes are clean. The test coverage is thorough. The review process caught real issues: a security regression in a cache key that included plaintext API secrets, a race condition in abort signal propagation, a 13-day review thread that forced a narrow fix into a proper shared resolution layer.

The engineering is not the problem. The organizational immune system is the problem. These bugs lived in production for weeks or months. They were invisible to the project's own tooling. They were found by individual contributors, not by systematic quality gates. That's not a codebase issue. That's a governance issue.

What I'd Ask the Maintainers

If I had fifteen minutes with the OpenClaw core team, here's what I'd want to know:

  • Why was the /v1/responses agent path shipped without an integration test that sends custom tools?
  • How long were the macOS and plugin-sdk CI lanes running against empty directories, and how many PRs merged through those lanes in the meantime?
  • What is the plan for abort signal propagation across the other runtime integrations? If Discord was missing it, are Telegram, Slack, and Matrix also running zombie sessions?
  • vincentkoc authored four of these ten PRs. What happens when that person takes a vacation?

Ten PRs. One day. Zero features. The code is better now. But “better now” isn't the same as “trustworthy,” and trust is the only currency an open-source platform has.

DeployClaw News · Opinion by Carlos Simpson

DeployClaw hosts OpenClaw instances. Upstream fixes ship automatically. This publication covers development independently.

Every fix. Applied automatically. Zero downtime.

DeployClaw patches your OpenClaw instance the moment upstream merges land. You never touch a commit hash.