CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-FH3F-Q9QW-93J9
5.90.04%

Identity Crisis: Breaking OpenClaw Sandbox Isolation with SHA-1 Collisions

Alon Barad
Alon Barad
Software Engineer

Feb 19, 2026·5 min read·2 visits

PoC Available

Executive Summary (TL;DR)

OpenClaw used SHA-1 to fingerprint sandbox environments. Because SHA-1 is cryptographically broken, an attacker could theoretically craft a malicious configuration that masquerades as a legitimate one, tricking the system into granting access to an existing, cached sandbox session.

OpenClaw, a platform for personal AI agents, was found using the deprecated SHA-1 hashing algorithm to generate unique identifiers for sandbox configurations. This flaw allows for potential hash collisions, where two distinct sandbox configurations—one benign and one malicious—could result in the same identifier. Consequently, the system might erroneously reuse an existing, privileged sandbox for an attacker's session, effectively bypassing isolation boundaries.

The Hook: Efficiency vs. Security

In the world of AI agents and containerized workloads, spinning up a new sandbox for every single request is expensive. It kills latency and eats RAM for breakfast. To solve this, platforms like OpenClaw use a caching mechanism: if you request a sandbox with a specific configuration (e.g., "Node.js 20, Network Access: False"), the system checks if it already has a warm container matching those specs. If it does, it reuses it. Fast, efficient, and usually safe.

But how does the system know it's the exact same configuration? It hashes the configuration object. This hash becomes the cache-key. If the hash matches, the doors open to the existing container. This relies entirely on the premise that two different configurations will never produce the same hash.

Enter OpenClaw's implementation. Instead of using a robust hashing algorithm to guarantee this uniqueness, the developers reached for a dusty tool from the cryptographic shed: SHA-1. In 2026, using SHA-1 for security-critical identity assertions is like locking your front door with a zip tie—it might hold for a moment, but it's not stopping anyone who brought a pair of scissors.

The Flaw: The Ghost of SHA-1

SHA-1 has been dead for a long time. Google announced the first practical collision (SHAttered) back in 2017. The cryptographic community has been screaming "STOP USING IT" for over a decade. The specific flaw in OpenClaw resides in src/agents/sandbox/config-hash.ts. The system takes a sandbox configuration, normalizes it (hopefully), stringifies it into JSON, and then feeds it into a SHA-1 hasher.

The resulting hash is treated as the immutable truth of what that sandbox contains. If an attacker can generate a configuration payload that is functionally different (e.g., includes a malicious volume mount or a different environment variable) but mathematically yields the same SHA-1 hash as a target legitimate configuration, the system gets confused. It sees the matching hash and says, "Ah, I know this environment," and hands over the keys to the existing, warm sandbox. This is a classic Hash Collision vulnerability applied to logical access control.

The Code: The Smoking Gun

Let's look at the offender. The code is simple, and that's part of the problem. It assumes JSON.stringify plus sha1 is enough to fingerprint a complex security boundary.

Here is the vulnerable implementation found in src/agents/sandbox/config-hash.ts:

// The Vulnerable Code
function computeHash(input: unknown): string {
  // Normalize the input (sort keys, etc.)
  const payload = normalizeForHash(input);
  
  // Convert to string
  const raw = JSON.stringify(payload);
  
  // THE BUG: Using sha1 for identity
  return crypto.createHash("sha1").update(raw).digest("hex");
}

The fix was straightforward. The maintainers swapped the engine out for SHA-256, which, as of now, still offers collision resistance suitable for this purpose.

function computeHash(input: unknown): string {
   const payload = normalizeForHash(input);
   const raw = JSON.stringify(payload);
-  return crypto.createHash("sha1").update(raw).digest("hex");
+  return crypto.createHash("sha256").update(raw).digest("hex");
 }

The Exploit: Sandbox Roulette

To exploit this, we don't need to break encryption; we just need to trick the bouncer. Imagine a legitimate administrative task runs with the following config:

{
  "role": "admin",
  "network": "internal-only",
  "retention": "persistent"
}

Let's say this hashes to a94a8fe5... (SHA-1). The system spins up a container with access to the internal database and caches it under that hash. Now, the attacker wants access to that container but doesn't have the admin role in their profile. They craft a malicious config:

{
  "role": "guest",
  "network": "public",
  "garbage_padding": "[BINARY_BLOB_ENGINEERED_FOR_COLLISION]"
}

Using techniques like chosen-prefix collision, the attacker tweaks the garbage_padding field until the SHA-1 hash of their malicious JSON also equals a94a8fe5....

When they send this request to OpenClaw, the system computes the hash, sees a94a8fe5..., checks its cache, and thinks, "Oh, the 'admin' sandbox is already running! Let me attach this user to it." The attacker is now dropped into a persistent, internal-networked admin shell, despite asking for a public guest session.

The Impact: Dirty Reuse

The impact here is subtle but dangerous. It violates the core tenet of containerization: isolation. If you cannot trust that two different IDs map to two different environments, you cannot trust the boundaries between users.

  1. Privilege Escalation: As described above, attaching to a higher-privileged existing container.
  2. Data Leakage: If a previous user left sensitive data (API keys, temporary files) in a "warm" sandbox, and an attacker collides with that sandbox's hash, they inherit the filesystem state.
  3. Cache Poisoning: An attacker could intentionally "poison" the cache with a broken or malicious environment that legitimate users then stumble into because their safe configuration hashes to the same value.

The Mitigation: Flush and Upgrade

The immediate fix is to upgrade openclaw to version 2026.2.15 or later. This version implements SHA-256, raising the bar for collision attacks from "computationally expensive but possible" to "heat-death of the universe" levels of difficulty.

However, updating the code isn't enough. The cache is persistent. If you have a Redis instance or a database mapping SHA-1 hashes to Docker container IDs, those entries are now potential landmines.

Action Plan:

  1. Patch: npm install openclaw@2026.2.15
  2. Purge: You must invalidate all existing sandbox caches. Delete the mapping of config-hash to container-id. Force all agents to spin up fresh environments using the new SHA-256 logic.
  3. Audit: Review your normalizeForHash logic. Ensure that semantically different objects (e.g., {a:1, b:2} vs {b:2, a:1}) are sorted deterministically before hashing, otherwise, you might have cache misses that hurt performance, even if they don't hurt security.

Official Patches

OpenClawCommit fixing the hash algorithm

Fix Analysis (1)

Technical Appendix

CVSS Score
5.9/ 10
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Probability
0.04%
Top 100% most exploited

Affected Systems

OpenClaw AI Agent PlatformOpenClaw Sandbox Runtime

Affected Versions Detail

Product
Affected Versions
Fixed Version
openclaw
openclaw
<= 2026.2.142026.2.15
AttributeDetail
Vulnerability TypeCryptographic Weakness (SHA-1 Collision)
CWE IDCWE-328
SeverityModerate
Attack VectorNetwork (Context Dependent)
Affected Componentsrc/agents/sandbox/config-hash.ts
Fix Version2026.2.15

MITRE ATT&CK Mapping

T1557Adversary-in-the-Middle
Credential Access
T1055Process Injection
Defense Evasion
CWE-328
Use of Weak Hash

The product uses a cryptographic algorithm that is known to be weak or broken, making it easier for an attacker to compromise the confidentiality or integrity of data.

Vulnerability Timeline

Fix committed by Peter Steinberger
2026-02-16
OpenClaw v2026.2.15 released
2026-02-17
GHSA-FH3F-Q9QW-93J9 Published
2026-02-18

References & Sources

  • [1]SHAttered: The first SHA-1 collision
  • [2]OpenClaw Repository

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.