<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dependency-Vulnerability — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/dependency-vulnerability/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 20:59:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/dependency-vulnerability/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Sandbox Bypass via Heartbeat Context Inheritance</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-sandbox-bypass/</link><pubDate>Thu, 02 Apr 2026 20:59:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-sandbox-bypass/</guid><description>A critical vulnerability in the openclaw npm package (&lt;=2026.3.28) allows a heartbeat context inheritance to bypass the sandbox via senderIsOwner escalation, patched in version 2026.3.31.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> npm package, a tool used for [describe package functionality if known, else leave generic], contains a critical vulnerability related to how heartbeat contexts are inherited. Specifically, improper handling of the <code>senderIsOwner</code> property during context inheritance allows a malicious actor to bypass intended sandbox restrictions. This vulnerability affects <code>openclaw</code> versions up to and including 2026.3.28. This issue was reported by @AntAISecurityLab and patched in version 2026.3.31, released on March 31, 2026. Defenders need to ensure that their <code>openclaw</code> dependencies are updated to the patched version or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious package that includes the vulnerable <code>openclaw</code> version (&lt;=2026.3.28) as a dependency.</li>
<li>The malicious package leverages the heartbeat functionality of <code>openclaw</code> to establish an initial context.</li>
<li>The attacker manipulates the heartbeat context inheritance mechanism to gain control of the <code>senderIsOwner</code> property.</li>
<li>By exploiting the inheritance flaw, the attacker escalates privileges within the <code>openclaw</code> sandbox environment.</li>
<li>The attacker utilizes the escalated privileges to execute arbitrary code within the sandbox.</li>
<li>The arbitrary code gains access to sensitive resources or data within the application utilizing the <code>openclaw</code> package.</li>
<li>The attacker exfiltrates the compromised data or uses the compromised application as a pivot point for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass the <code>openclaw</code> sandbox, potentially leading to arbitrary code execution within applications using the vulnerable package. While the exact scope of impact depends on the application using <code>openclaw</code>, the critical severity suggests significant potential for data breaches, service disruption, or further lateral movement within the compromised environment. Given the widespread use of npm packages, a successful exploit could affect a large number of applications and users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> npm package to version 2026.3.31 or later. This version contains the fix for the identified vulnerability.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts in your environment. Focus on monitoring process creation and file events related to <code>openclaw</code>.</li>
<li>Implement software composition analysis (SCA) tools to automatically detect vulnerable dependencies like <code>openclaw</code> in your projects.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sandbox-bypass</category><category>dependency-vulnerability</category><category>npm</category></item><item><title>C2C CI utils Vulnerable to DoS via pyasn Dependency (CVE-2026-30922)</title><link>https://feed.craftedsignal.io/briefs/2026-07-c2c-ci-utils-dos/</link><pubDate>Thu, 26 Mar 2026 22:27:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-07-c2c-ci-utils-dos/</guid><description>The c2cciutils package is vulnerable to denial of service due to an uncontrolled recursion vulnerability (CWE-674) in the pyasn dependency, specifically versions before 1.1.65.</description><content:encoded>&lt;p>The c2cciutils package, a CI utility, is susceptible to a denial-of-service (DoS) attack due to an uncontrolled recursion vulnerability within its pyasn dependency. Specifically, versions of c2cciutils prior to 1.1.65 are affected. This vulnerability, identified as CVE-2026-30922, stems from a flaw in the pyasn library (see GHSA-jr27-m4p2-rc6r) which leads to excessive resource consumption when processing certain inputs. An attacker can exploit this flaw remotely with low complexity, no…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>denial-of-service</category><category>pyasn</category><category>c2cciutils</category><category>dependency-vulnerability</category></item></channel></rss>