OpenClaw v2026.4.29-beta.3: Enhanced Messaging, Memory, and Core Reliability
OpenClaw v2026.4.29-beta.3 has been released, bringing a robust set of improvements and new features across the platform. This beta release focuses on refining agent interactions, bolstering memory systems, expanding model provider coverage, and enhancing overall system stability and security. Users will find more intelligent messaging, a richer memory experience, and a more dependable and secure operational environment.
Key Changes
This release introduces several pivotal changes that enhance OpenClaw's capabilities:
- Advanced Messaging and Automation: Messaging and automation now feature active-run steering by default, visible-reply enforcement, and spawned subagent routing metadata. A new opt-in system for inferred follow-up commitments allows for heartbeat-delivered reminders, making agent interactions more proactive and context-aware. This includes a new
steermode for draining pending steering messages at model boundaries, replacing the legacyqueuemode, and the introduction of a globalmessages.visibleRepliessetting for stricter output control. - People-Aware Memory System: The memory system evolves into a sophisticated, people-aware wiki. This includes provenance views, per-conversation Active Memory filters, partial recall on timeout, and bounded REM preview diagnostics. Agent-facing people wiki metadata, canonical aliases, person cards, relationship graphs, privacy reports, and enhanced search modes significantly improve how agents manage and recall information about individuals.
- Expanded Provider and Model Coverage: OpenClaw now officially supports NVIDIA providers, complete with API-key onboarding and static catalog metadata. This release also brings Bedrock Opus 4.7 thinking parity and safer replay and streaming behaviors for Codex and OpenAI-compatible models. Notably, explicitly configured
openai-codex/gpt-5.4-miniinline entries are now suppressed to prevent stale configurations from bypassing manifest capability blocks. - Enhanced Gateway and Plugin Reliability: Significant effort has been directed towards improving the reliability of the gateway and packaged plugins. This includes fixes for slow-host startup, reusable model catalogs, event-loop readiness diagnostics, runtime-dependency repair, stale-session recovery, and version-scoped update caches. A new SQLite-backed plugin state store (
api.runtime.state.openKeyedStore) enables restart-safe keyed registries with TTL, eviction, and automatic plugin isolation. - Comprehensive Channel Fixes: Numerous fixes address specific issues across various communication channels. This includes handling Slack Block Kit limits, improving Telegram proxy, webhook, polling, and send resilience, refining Discord startup and rate-limit handling, enhancing WhatsApp delivery and liveness, and resolving edge cases in Microsoft Teams, Matrix, and Feishu.
- Strengthened Security and Operations: Security has been a major focus, with the addition of OpenGrep scanning, sharper GHSA triage policies, and safer handling of
exec, pairing, and owner-scope operations. Docker and onboarding automation have been improved, and web-fetch now includes IPv6 ULA opt-in for trusted proxy stacks.
Impact
This release addresses numerous issues, significantly improving the stability, security, and user experience of OpenClaw:
- Improved Stability and Performance: Several fixes target core stability. The gateway now exits gracefully with specific codes for supervised lock and
EADDRINUSEconflicts, preventingRestart=alwaysloops. Blank user prompts no longer leak raw empty-input provider errors in Telegram/group sessions. Browser control runtime is now shared across the HTTP control server andbrowser.request, ensuring consistent configuration. Startup diagnostics are now opt-in, providing better insights into slow starts without bespoke instrumentation. Runtime dependency issues, such as those causing crash-loops on cross-version container upgrades or npm crashes with empty install plans, have been resolved. Gateway startup is more robust, with bounded local discovery advertisement and serving of the last successful model catalog during background refreshes. - Enhanced Security Posture: Critical security vulnerabilities have been patched. Configured tool sections like
tools.execandtools.fsno longer implicitly widen restrictive profiles, requiring explicitalsoAllowentries for enhanced control. Outbound security now strips re-formed HTML tags during plain-text sanitization to prevent<script>sequence injections. Credential comparisons use padded timing-safe buffers for equality checks, and debug log arguments are sanitized to prevent log forging. Thefile.fetchtool now requires canonical read-path preflight authorization, failing closed on missing, absolute, or traversingdir.fetchentries. - Reliable Channel Integrations: Channel-specific issues have been thoroughly addressed. Slack Block Kit limits are now respected, preventing malformed interactive replies. Telegram polling stability is enhanced, with low long-polling client timeouts clamped and durable message edits used for streaming previews to prevent flickering. Discord startup and rate-limit handling are more robust, cooling down Cloudflare 429 responses and deriving application IDs from parseable tokens. WhatsApp delivery is more reliable, requiring Baileys outbound message IDs before marking auto-replies delivered.
- Better Developer and Operator Experience: CLI commands like
openclaw agentsandopenclaw statusare now faster and more reliable, avoiding hangs caused by unnecessary plugin runtime preloads. The Control UI is more responsive, with fixes for mobile chat settings persistence, sidebar trigger affordances, and preventing accidental refreshes during active chat runs. PDF extraction now correctly resolves standard fonts, preventingfile://URL lookup failures. Cron job schedule edits are validated before persisting, andcron add --messagenow warns when--agentis omitted. TheinferCLI is more reliable, isolating local model runs to their own session keys and allowing web search to fall through on structured provider errors. - Memory System Refinements: The
memory_forgetcandidate list now shows full UUIDs for unambiguous deletion.ltm listnow returns actual memory entries as JSON, with--limitand--order-by-created-atoptions. Active Memory'stimeoutMsis now scoped to the embedded recall/model run, with a plugin-level setup grace window, preventing premature timeouts due to initialization overhead. The hidden recall sub-agent now supportsmemory_recall,memory_search, andmemory_getto ensure compatibility with various bundled memory backends.
Upgrade Guide
This release includes several changes that may require user action or configuration updates. Please review the following guidance carefully:
Tool Section Permissions: If you are using restrictive profiles (e.g.,
messaging,minimal) and rely on tools liketools.execortools.fs, you must now explicitly add these tools to thealsoAllowentries in your configuration. A startup warning will identify affected configurations. This is a security hardening measure to prevent implicit widening of tool access.Active Memory
ActiveRecallResultType: Developers building against theActiveRecallResulttype in Active Memory should be aware of a newtimeout_partialdiscriminant. If your code exhaustively switches onresult.status, you will need to update your handling to include this new status to avoid TypeScript errors. This is intentional to surface useful partial recall summaries on timeout.Telegram Exec Approvals Configuration: Configurations that previously relied on general Telegram chat allowlists (
allowFrom,defaultTo) forexectool approvals will no longer function as expected. You must now explicitly configureexecApprovals.approverswithin your Telegram channel settings or ensure the owner identity is defined viacommands.ownerAllowFrom. This aligns Telegram's approval mechanism with other channels for enhanced security.DM Policy Hardening: The `dmPolicy=