Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Fixes plugin install breakage introduced in OpenClaw 2026.4.1, plus two polish items caught during cold-start dogfooding.
Changes
Critical:
package.json— removeopenclaw.hooksfieldOpenClaw 2026.4.1 added
validateHookDir()which requires aHOOK.mdfile when the hook-pack install path is used. Theopenclaw.hooksfield inpackage.jsonwas triggering this path, causing:Removing
openclaw.hooksroutes the install through the plugin installer (openclaw.extensionspath), which has no HOOK.md requirement. Plugin installs cleanly on 2026.4.1 and 2026.4.2.status.go— showOpenClaw (plugin)in status summaryPreviously showed
OpenClaw (bridge)even when the native plugin was active. Now checks for~/.openclaw/extensions/rampartfirst and showsOpenClaw (plugin)when present.setup_openclaw_plugin.go— explain scanner false positiveOpenClaw's security scanner flags the plugin during install because it reads a local token file and makes authenticated requests. Added a note clarifying this is a false positive (localhost-only, no exfil).
Testing
rampart statusshowsOpenClaw (plugin)rampart doctor: 0 issues, 0 warningsbefore_tool_callenforcement verified:runBeforeToolCallis properly awaited in 2026.4.2 (closed bug: before_tool_call plugin hook is fire-and-forget in OpenClaw — BLOCK decisions not enforced #251)