RT @ZeffMax: NEU: Google hat gestern das Projekt Mariner stillschweigend abgeschaltet, den KI-Agenten für die Websuche, den es letztes Jahr auf der Google IO vorgestellt hatte.

mehr auf Arint.info

#Google #KI #OpenClaw #ProjektMariner #TechNews #WebSuche #arint_info

https://x.com/ZeffMax/status/2051824497242833234#m

Arint - SEO+KI (@[email protected])

<p>RT @ZeffMax: NEU: Google hat gestern das Projekt Mariner stillschweigend abgeschaltet, den KI-Agenten für die Websuche, den es letztes Jahr auf der Google IO vorgestellt hatte.</p> <p><a href="https://arint.info/@Arint/116527048218198426">mehr</a> auf <a href="https://arint.info/">Arint.info</a></p> <p>#Google #KI #OpenClaw #ProjektMariner #TechNews #WebSuche #arint_info</p> <p><a href="https://x.com/ZeffMax/status/2051824497242833234#m">https://x.com/ZeffMax/status/2051824497242833234#m</a></p>

Mastodon Glitch Edition

OpenClaw Had a Rough Week
OpenClaw 프로젝트가 최근 몇 차례의 업데이트 과정에서 플러그인 의존성 문제와 성능 저하 등 여러 문제를 겪으며 어려움을 겪었다. 핵심 기능을 축소하고 선택적 기능을 별도의 ClawHub로 분리하는 등 구조 개편을 진행 중이며, 안정적인 장기 지원(LTS) 버전도 곧 발표할 예정이다. 이번 문제는 복잡한 의존성 그래프와 설치 시 동작, 번들링된 플러그인 관리 미숙에서 비롯되었으며, 프로젝트 운영 방식도 창립자 중심에서 벗어나 팀 기반으로 전환 중이다. OpenAI의 지원을 받아 보안과 안정성을 강화하며 인프라용 소프트웨어로서 신뢰성을 높이는 데 집중하고 있다.

https://openclaw.ai/blog/openclaw-rough-week

#openclaw #plugin #dependency #infrastructure #opensource

OpenClaw Had a Rough Week — OpenClaw Blog

What happened around the 2026.4.24 and 2026.4.29 releases, why the direction was right, and what we are changing now.

CVE Alert: CVE-2026-43571 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.4.10 contains a plugin trust bypass vulnerability that allows channel setup catalog lookups to resolve workspace plugin shadows before

RedPacket Security
CVE Alert: CVE-2026-43573 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.4.10 contains a server-side request forgery policy bypass vulnerability in existing-session browser interaction routes. Attackers can

RedPacket Security
CVE Alert: CVE-2026-43569 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.4.9 contains an authentication bypass vulnerability allowing untrusted workspace plugins to be auto-enabled during non-interactive

RedPacket Security
CVE Alert: CVE-2026-43533 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.4.10 contains an arbitrary file read vulnerability in QQBot media tags that allows attackers to reference host-local paths outside the

RedPacket Security
CVE Alert: CVE-2026-43531 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.4.9 contains an environment variable injection vulnerability allowing malicious workspace .env files to set runtime-control variables.

RedPacket Security
CVE Alert: CVE-2026-43532 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw versions 2026.4.7 before 2026.4.10 fail to normalize Discord event cover image parameters in sandbox media processing. Attackers can bypass media

RedPacket Security
CVE Alert: CVE-2026-42439 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.4.10 contains a server-side request forgery policy bypass vulnerability in the browser tabs action select and close routes. Attackers can

RedPacket Security