← Back to Blogs
GH Issues

OpenClaw Issue Digest: Critical Session State and Runtime Stability Regressions

06:30–12:30 UTC May 21, 2026

OpenClaw Issue Digest: Critical Session State and Runtime Stability Regressions

Open Issues

Recent activity in the OpenClaw repository reveals a significant cluster of regressions affecting session continuity, runtime stability, and security. The most critical issues center around the Codex app-server and the management of isolated sessions, particularly for cron jobs and Telegram integrations.

Critical Runtime & Stability Issues

Several reports highlight severe stability problems in the Codex runtime. Issue #84492 describes a bug where turn.status: "interrupted" is incorrectly projected as an abort, suppressing the "no-visible-answer" guard and leaving users with tool output but no final response. Similarly, #84516 reports silent truncation of long agent replies (around 1000-1100 characters) when using the Codex app-server headlessly, despite no explicit abort or timeout.

Performance is also a major concern. Issue #84037 points to substantial steady-state CPU overhead from the Codex app-server, while #84935 reports severe event loop blocking in version 2026.5.x, causing delays of up to 40 seconds before messages are processed.

Session State & Memory Regressions

Session continuity is currently fragile. Issue #84936 is a beta-blocker where runtime policy session keys leak into the LCM context for Telegram DMs, breaking continuity and potentially causing context-limit failures. In the memory subsystem, #49524 reports a critical liveness bug where a stalled memory_search can paralyze an entire live session instead of failing open.

Cron job reliability has also plummeted. Issues #84923 and #84922 describe scenarios where systemEvent jobs report success but never execute shell commands, or are silently stripped from the store if they use non-standard payload kinds. Furthermore, #50621 notes that these jobs often time out after ~960 seconds even when running in the main session.

Security & Integration Gaps

A critical security vulnerability was identified in #50630, where combining gateway.auth.mode=none with gateway.tailscale.mode=serve exposes the gateway to the entire Tailnet without any authentication.

Integration issues persist across channels. For Telegram, #49104 reports silent truncation of responses containing angle-bracket tags (like <think>) due to HTML parse mode conflicts. For Feishu, #52238 describes a routing error where topic groups are misidentified as p2p chats, routing messages to the wrong session.

Key Themes

1. Codex Runtime Fragility

There is a recurring theme of "silent failures" within the Codex app-server. Whether it is the truncation of long responses (#84516), the misinterpretation of interrupted turns (#84492), or high CPU overhead (#84037), the runtime is struggling with stability and resource efficiency.

2. Session & Context Leakage

Issues like #84936 and #49523 (where transcript mirroring uses process.cwd() allowing cross-agent contamination) suggest that workspace and session isolation are not being strictly enforced across all code paths.

3. Observability Gaps

Many users are reporting "silent

References

Issues