OpenClaw v2026.4.9 is out, and it reads like a direct response to a very public crisis.
On April 4, Anthropic cut off third-party tool access to Claude subscription limits, citing computational strain from tools bypassing its prompt cache optimization. OpenClaw's founder posted a video with the line "Anthropic banned us. GPT-5.4 got stronger. We moved on." The video reached 1.3 million views in 24 hours. The bravado was real. So was the underlying problem: an agent platform that had been scaling fast on someone else's compute was suddenly forced to stand on its own infrastructure.
v2026.4.9 is the first installment of that stand. Every feature maps to code in the release notes.
Dreaming reaches GA
The headline feature is Dreaming, OpenClaw's background memory consolidation system, reaching General Availability in version 4.5 on April 6 after six months of testing across thousands of operators. Dreaming is not a vector store or a retrieval setup. It is a three-phase architecture: Light (ingest and stage recent short-term material), Deep (score candidates and write promoted facts to MEMORY.md), and REM (reflect on themes and recurring patterns, with no durable writes). The Deep phase is the write phase — it's where entries that pass the promotion thresholds actually get appended to MEMORY.md. REM reflects on patterns but produces no durable output. The REM phase is the distinctive part: the system actively revisits what it has already stored, looking for conceptual patterns that did not surface in initial ingestion.
The release adds a grounded REM backfill lane with historical rem-harness --path, which lets operators replay memory consolidation over arbitrary time ranges. Also new: a Dream Diary UI in the Control Panel with timeline navigation, backfill and reset controls, and traceable dreaming summaries. mbelinky is credited as the primary contributor on the dreaming features.
Promotion into durable memory is gated by three simultaneous thresholds: a relevance score of at least 0.8, at least three recall events for a given entry, and at least three unique query contexts in which it appeared. The scoring uses six weighted signals: Frequency (0.24), Relevance (0.30), Query diversity (0.15), Recency (0.15), Consolidation (0.10), and Conceptual richness (0.06). These are not arbitrary. They reflect a theory of what makes a memory worth keeping: stuff that comes up often, in different contexts, recently, alongside other consolidated facts, with enough conceptual specificity to be distinguishable.
What this means in practice: Dreaming is now a traceable, tunable, operator-visible subsystem rather than an opaque cron job that occasionally wrote things to memory. The REM backfill lane matters for operators who have been running OpenClaw long enough to have gaps in their memory graph — they can now close those gaps explicitly.
Security surface hardens
Five distinct security fixes shipped in the same release.
The most architecturally interesting is the SSRF quarantine bypass fix. Server-Side Request Forgery in agentic systems is not the same as in traditional web apps. The agent makes outbound requests as part of its toolchain, often to internal services, and the system's safety checks can be stale by the time a browser interaction-driven navigation completes. OpenClaw's fix re-runs blocked-destination safety checks after interaction-driven main-frame navigations triggered by click, evaluate, hook-triggered click, or batched action flows. Without this, a sufficiently constructed browser interaction could land on a forbidden URL after the safety check had already passed.
Four other fixes round out the surface. Environment variables from untrusted workspace .env files are now blocked for runtime-control, browser-control override, and skip-server settings. Remote node exec events are marked untrusted and sanitized before enqueueing, since the node is the source and cannot be assumed trustworthy. The basic-ftp dependency was bumped to 5.2.1 to patch a CRLF command injection vulnerability. And workspace plugins can no longer collide with bundled provider auth-choice IDs during non-interactive onboarding, which prevents operator secrets from leaking into untrusted plugin handlers unless those plugins are explicitly trusted.
These are not theoretical. SSRF in agentic systems lives in the gap between "should be blocked" and "actually blocked" — a gap that exists entirely in the timing of async operations driven by tool interactions.
Provider auth aliases and the rest
Provider manifests can now declare providerAuthAliases, which let provider variants share environment variables, authentication profiles, config-backed auth, and API-key onboarding choices without core-specific wiring. This is a configuration ergonomics change, but it signals something about the OpenClaw team's expectations: they are building for a world where many provider variants need to coexist without custom per-variant work.
character-vibes evaluation reports also shipped, for comparing candidate behavior faster in live QA with model selection and parallel run support. This is infrastructure for the kind of evaluation that happens before deployment, not in production: a sign that OpenClaw is building out the operational tooling that production agent deployments require.
The release notes credit 30+ individual PRs across memory, dreaming, security, plugins, providers, iOS, Android, Matrix, Slack, and Codex CLI. That breadth is itself a signal. The platform is being used in enough different contexts that the maintenance surface stays wide.
What this release is really about
The Anthropic ban forced a reframe. OpenClaw had been running significant compute load on someone else's subscription tier. When that was cut, the platform had to become more serious about what it was on its own: a memory system for agents that can run without a direct line to a frontier model's context cache, a security posture that does not assume the node is trusted, and an operational surface that operators can actually inspect and debug.
v2026.4.9 is the first release that looks like it was designed with that reframe in mind. Dreaming is no longer experimental. The security patches address real interaction-driven attack surfaces. The provider auth work makes the platform more operable at scale. None of this is flashy. All of it is necessary infrastructure for an agent platform that intends to be around in two years.
The Anthropic ban hurt. The response is real code.