<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>System-Prompt-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/system-prompt-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 14:22:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/system-prompt-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Trust Model Vulnerability: System Prompt Channel Injection</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-trust-model/</link><pubDate>Thu, 09 Apr 2026 14:22:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-trust-model/</guid><description>OpenClaw versions 2026.4.2 and earlier are vulnerable to a trust model issue where authenticated wake hooks or mapped wake payloads can be promoted into the trusted System prompt channel, potentially leading to security vulnerabilities within the OpenClaw trust model.</description><content:encoded><![CDATA[<p>OpenClaw, a user-controlled local assistant, is susceptible to a vulnerability affecting its trust model. This vulnerability, present in versions 2026.4.2 and earlier, allows authenticated <code>/hooks/wake</code> calls and mapped <code>wake</code> payloads to be improperly promoted into the trusted <code>System:</code> prompt channel. This occurs because the application fails to correctly differentiate between trusted system events and untrusted user-supplied events. The issue was reported on April 9th, 2026, and addressed in version 2026.4.8. The vulnerability specifically impacts the OpenClaw trust model, which assumes a single-tenant environment; it is not applicable to multi-tenant service boundaries. Defenders need to ensure OpenClaw is updated to the patched version to mitigate potential security exploits within this trust model.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable OpenClaw instance running version 2026.4.2 or earlier.</li>
<li>Attacker authenticates to the OpenClaw instance.</li>
<li>Attacker crafts a malicious payload intended to be interpreted as a standard &ldquo;wake&rdquo; command.</li>
<li>Attacker sends a specially crafted <code>/hooks/wake</code> request or a mapped <code>wake</code> payload containing the malicious content.</li>
<li>Due to the vulnerability, OpenClaw incorrectly promotes the attacker-controlled payload into the trusted <code>System:</code> prompt channel.</li>
<li>The OpenClaw assistant processes the malicious payload within the <code>System:</code> context, granting it elevated privileges within the application&rsquo;s trust model.</li>
<li>The malicious payload executes arbitrary commands or actions within the OpenClaw environment as a trusted system component.</li>
<li>The attacker achieves their objective, which could involve data manipulation, unauthorized access to local resources, or other malicious activities within the scope of the OpenClaw assistant.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows an attacker to inject malicious commands into the trusted system prompt channel of OpenClaw. Successful exploitation could lead to unauthorized data access, modification, or execution of arbitrary code within the OpenClaw environment. While the advisory does not specify the number of affected users, any instance running OpenClaw version 2026.4.2 or earlier is vulnerable. The primary risk is the compromise of the user&rsquo;s local assistant and potentially the data it manages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to remediate the vulnerability (reference: Affected Packages / Versions).</li>
<li>Monitor OpenClaw logs for suspicious activity related to the <code>/hooks/wake</code> endpoint (develop custom rules based on your OpenClaw logging configuration).</li>
<li>Deploy the Sigma rule provided in this brief to detect potential exploitation attempts by monitoring process execution following <code>/hooks/wake</code> requests.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>trust-model</category><category>system-prompt-injection</category><category>npm</category></item></channel></rss>