feat(kiloclaw): bump openclaw to version 2026.3.7#926
Open
kilo-code-bot[bot] wants to merge 1 commit intomainfrom
Open
feat(kiloclaw): bump openclaw to version 2026.3.7#926kilo-code-bot[bot] wants to merge 1 commit intomainfrom
kilo-code-bot[bot] wants to merge 1 commit intomainfrom
Conversation
Contributor
Author
Code Review SummaryStatus: No Issues Found | Recommendation: Merge Files Reviewed (1 files)
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Bumps openclaw from
2026.3.2to2026.3.7inkiloclaw/Dockerfile.Verification
openclaw@2026.3.2→openclaw@2026.3.7Visual Changes
N/A
Reviewer Notes
The following changes in this release may require attention before or after deploying:
BREAKING — Gateway auth mode now required when both token and password are configured (#35094): If
kiloclaw/start-openclaw.shor the openclaw config sets bothgateway.auth.tokenandgateway.auth.password(including SecretRefs), you must now explicitly setgateway.auth.modeto eithertokenorpassword. Without this, the gateway will fail to start, pairing will break, and TUI will fail. Check the openclaw config before deploying.Security/Config — Fail closed on config validation errors (#9040): Invalid configs no longer silently fall back to permissive runtime defaults. If the openclaw config has any validation errors, the gateway will now refuse to start rather than starting with defaults. Ensure the config is valid before deploying.
Config/invalid-load fail-closed (#28140):
INVALID_CONFIGno longer converts to an empty runtime config. Unknown keys or malformed config will now fail closed. This could cause startup failures if the config has any unrecognized fields.Docker/multi-stage build (#38479): openclaw's own upstream Dockerfile has been restructured as a multi-stage build. This does not directly affect our
kiloclaw/Dockerfile, but if we ever sync from upstream, be aware of the structural change.Docker/
OPENCLAW_EXTENSIONS(#32223): NewOPENCLAW_EXTENSIONSbuild arg allows pre-installing bundled extension npm dependencies into the image. Not a breaking change, but available if we want faster/more reproducible extension startup.Release Notes (v2026.3.7)
Full release notes from openclaw/openclaw v2026.3.7
Changes
ContextEngineplugin slot with full lifecycle hooks (bootstrap,ingest,assemble,compact,afterTurn,prepareSubagentSpawn,onSubagentEnded), slot-based registry with config-driven resolution,LegacyContextEnginewrapper preserving existing compaction behavior, scoped subagent runtime for plugin runtimes viaAsyncLocalStorage, andsessions.getgateway method. Enables plugins likelossless-clawto provide alternative context management strategies without modifying core compaction logic. Zero behavior change when no context engine plugin is configured. (#22201) thanks @jalehman./acp spawn, support Telegram topic thread binding (--thread here|auto), route bound-topic follow-ups to ACP sessions, add actionable Telegram approval buttons with prefixed approval-id resolution, and pin successful bind confirmations in-topic. (#36683) Thanks @huntharo.agentIdoverrides in forum groups and DM topics so topics can route to dedicated agents with isolated sessions. (#33647; based on #31513) Thanks @kesor and @Sid-Qin.es) locale support in the Control UI, including locale detection, lazy loading, and language picker labels across supported locales. (#35038) Thanks @DaoPromociones.OPENCLAW_EXTENSIONSso container builds can preinstall selected bundled extension npm dependencies into the image for faster and more reproducible startup in container deployments. (#32223) Thanks @sallyom.prependSystemContextandappendSystemContextso static plugin guidance can be placed in system prompt space for provider caching and lower repeated prompt token cost. (#35177) thanks @maweibin.plugins.entries.<id>.hooks.allowPromptInjection, validate unknown typed hook names at runtime, and preserve legacybefore_agent_startmodel/provider overrides while stripping prompt-mutating fields when prompt injection is disabled. (#36567) thanks @gumadeiras.session:compact:beforeandsession:compact:afterinternal events plus plugin compaction callbacks with session/count metadata, so automations can react to compaction runs consistently. (#16788) thanks @vincentkoc.agents.defaults.compaction.postCompactionSectionsso deployments can choose whichAGENTS.mdsections are re-injected after compaction, while preserving legacy fallback behavior when the documented default pair is configured in any order. (#34556) thanks @efe-arv.messages.tts.openai.baseUrlconfig support with config-over-env precedence, endpoint-aware directive validation, and OpenAI TTS request routing to the resolved base URL. (#34321) thanks @RealKai42.channels.slack.typingReactionso Socket Mode DMs can show reaction-based processing status even when Slack native assistant typing is unavailable. (#19816) Thanks @dalefrieswthat.allowBots: "mentions"to only accept bot-authored messages that mention the bot. Thanks @thewilloftheshadow.ensureLoadedsojobs.json.bakkeeps the pre-edit snapshot for recovery, while preserving backup creation on explicit user-driven writes. (#35234) Thanks @0xsline.OPENCLAW_VARIANT=slimbuild arg for a bookworm-slim variant. (#38479) Thanks @sallyom.google/gemini-3.1-flash-lite-previewsupport across model-id normalization, default aliases, media-understanding image lookups, Google Gemini CLI forward-compat fallback, and docs.Breaking
gateway.auth.modewhen bothgateway.auth.tokenandgateway.auth.passwordare configured (including SecretRefs). Setgateway.auth.modetotokenorpasswordbefore upgrade to avoid startup/pairing/TUI failures. (#35094) Thanks @joshavant.Fixes
(See full release notes at https://github.com/openclaw/openclaw/releases/tag/v2026.3.7)