OpenClaw v2026.5.20 Reconstructed Execution Authorization and Enhanced Discord Voice

robot
Abstract generation in progress
AIMPACT News, according to Dazhan Beating Monitoring, the open-source terminal programming agent OpenClaw released version v2026.5.20, restructuring the underlying execution authorization mechanism and deeply integrating Discord real-time voice and strategy control.
The new version has completely removed the old execution allow list based on the cat command combination.
After the security mechanism upgrade, users must use the dedicated read tool to load Skill files, and the system will only automatically permit verified Skill execution files, thereby blocking security vulnerabilities caused by non-standard script calls.
Discord real-time voice sessions now feature a user dynamic follow function.
AI can intelligently follow a specified user across voice channels, supporting seamless switching among multiple users, and retains the DAVE recovery mechanism.
The system defaults to injecting profile and role context from files such as IDENTITY.md, USER.md, and SOUL.md during real-time voice sessions, enhancing the realism of voice interactions.
Users can also disable this feature directly through the voice.realtime.bootstrapContextFiles parameter.
In operation control and management, the new version has a built-in Policy strategy plugin in the command line, supporting channel consistency checks and workspace repairs.
The new version adds device code login method to the xAI interface, allowing users to complete authorization via OAuth without a local browser callback.
The local model toggle experimental.localModelLean now supports independent activation for individual Agents, no longer requiring global enforcement.
The OpenRouter interface now fully follows the service provider-level params.provider routing strategy and allows overrides using model and agent parameters.
In underlying dependencies, the bundled Codex suite has been upgraded to version 0.132.0, fixing issues such as scheduled tasks occupying main session channels and lost Codex encrypted responses.
(Source: BlockBeats)
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 6
  • 2
  • Share
Comment
Add a comment
Add a comment
WalletEarlyAccessAlarm
· 17h ago
Skill is loaded with read, executing file whitelist, this part is taken seriously for security.
View OriginalReply0
StardustRouter
· 17h ago
OpenRouter coverage parameters, routing war enters a heated stage
View OriginalReply0
OutsiderOfZhiyuandao
· 18h ago
Codex 0.132.0 Fix bugs? My bug report for 0.131.9 still hasn't been addressed.
View OriginalReply0
AccountantsAlsoGetInto
· 18h ago
Conversation injection profile can be turned off, privacy options are well provided.
View OriginalReply0
MevTeaBreak
· 18h ago
As long as DAVE recovery is still available, that's fine; my life was given by DAVE.
View OriginalReply0
ProtocolPaladin
· 18h ago
Removed the Cat-style whitelist praise, finally no longer have to serve that cat.
View OriginalReply0
  • Pinned