Until last week, any caller connected to OpenClaw through MCP — the protocol that lets AI agents share and invoke tools across different model providers — could ask the platform to run its built-in cron scheduler, a tool that only the instance owner is supposed to control. The fix was one line of code. The gap had been there since the bridge was built.
PR #70698, merged with the 2026.4.23-beta.6 release, filters owner-only tools out of the MCP plugin handler before they are registered. Greptile, the automated code reviewer on the pull request, scored it 5/5 confidence: "a one-line filter that closes a real security hole." The PR was contributed by @vincentkoc, who also authored or co-authored most of the other security patches in the same build.
Fourteen additional security fixes shipped alongside it. Teams got a cross-bot token replay fix: the Microsoft Teams plugin was accepting shared Bot Framework audience tokens that didn't verify which Teams app they were issued for, so a token from one bot could replay against another. Android tightened its cleartext gateway pairing rules, which previously treated .local hostnames and dotless labels as safe for unencrypted connections — they aren't. QQBot's /bot-approve command had no framework auth check, meaning unauthenticated QQ senders could change exec approval settings without permission. The Discord slash-command handler was letting channel policy bypass configured owner and member restrictions. The Android intent system was auto-dispatching ASK_OPENCLAW app actions without user confirmation, which would let malicious external apps fire injected prompts directly. And the gateway's config API shifted from open-by-default to fail-closed: agent-driven config.apply and config.patch calls now require explicit allowlisting.
The WhatsApp integration got two separate fixes in the same build. Contact cards, vCard objects, and location payloads were leaking their free-text fields into inline message bodies where they could carry hidden prompt-injection payloads. A parallel fix for group chats closed the same vector: channel-sourced group names and participant labels were rendering in system prompts rather than being fenced as untrusted metadata.
The release is the third OpenClaw build shipped on April 23 — following beta.4, which patched four CVEs including a 9.9 critical, and beta.5, which shifted the platform to OAuth-based authentication. That the three builds share a single date and version base (2026.4.23) makes the architecture visible: OpenClaw is building out MCP support, an agent execution harness (ACPX), webhook infrastructure, and multi-platform messaging integrations simultaneously, and each new surface brings its own boundary cases. The MCP privilege escalation, the Teams token replay, and the Android cleartext bypass don't share a root cause — they share a pattern. Each one is a place where a trust assumption in one layer didn't survive contact with a caller from another.
Beta.6 also ships image generation through Codex OAuth, so openai/gpt-image-2 works for users who have Codex authentication configured but no direct OPENAI_API_KEY. That's a real capability unlock for deployments that routed model access through Codex rather than direct API credentials. There's also optional forked context for sessions_spawn runs, letting child agents inherit the parent transcript when needed rather than always starting clean.
The volume of security patches consolidated into a single beta is harder to dismiss than any individual fix. Whether the architectural assumption underneath — that declaring a tool ownerOnly is sufficient to protect it across all protocol bridges — holds as the platform adds more protocol layers is the question beta.6 doesn't answer. If a cron tool missed the MCP filter, the question is what else the existing pattern doesn't cover.