Resources / Archive release review
OpenClaw 2026.4.29 is a governance-and-operability release. The practical signal is more inspectable memory behavior (people-aware wiki and provenance), tighter control over where active recall is allowed, and an operator-grade safety rail around restrictive tool profiles. It is not evidence for a broader memory rollout, automatic dreaming promotion, session-memory injection, or “set-and-forget” channel reliability.
tools.exec/tools.fs sections no longer implicitly widen restrictive profiles like messaging or minimal. If you relied on that, you now need explicit alsoAllow entries.allowedChatIds/deniedChatIds as a governance surface, not a convenience toggle.allowedChatIds and deniedChatIds so operators can allow recall only on the lanes that have earned it (direct, group, or channel), while keeping broad sessions skipped.messages.visibleReplies lets operators require visible output to go through message(action=send) (not accidental side effects), tightening operator observability across chat sources.tools.exec/tools.fs sections no longer implicitly widen restrictive profiles; operators who need those tools under messaging/minimal must declare explicit alsoAllow entries.The safe public interpretation is more auditable memory behavior and tighter recall control, not expanded autonomous long-term memory.
alsoAllow and verify the startup warnings are gone.| If you are... | This release matters because... |
|---|---|
| governing active memory across multiple chats | you can allow recall only where it is earned, instead of widening by habit |
| owning memory provenance and trust tiers | people wiki and provenance reports make review rules easier to operationalize |
| supporting multi-channel operators | visible-reply enforcement reduces ambiguity about what was actually sent |
| running restrictive profiles in production-ish lanes | exec/fs widening requires explicit intent, which reduces accidental permission drift |
| deciding whether to widen active memory | the answer is still “not from this release alone” |
If the main gain you want from 2026.4.29 is a safer, more auditable memory surface (provenance, people-aware claims, and scoped recall) without turning it into a broader memory promise, start with the OpenClaw Discernment Control Kit.
If you are still fighting first healthy activation, transcript hygiene, memory-health verification, and retrieval debugging, start with the OpenClaw Native Memory Activation Kit first.
If activation, recall scoping, provenance review rules, support triage, channel routing, and approval controls are already tangled together, use the OpenClaw Memory Architecture Bundle.
OpenClaw 2026.4.29 is meaningful because it makes memory governance more inspectable and recall scope more controllable. The best rollout response is not to widen memory. It is to tighten review rules, narrow recall lanes intentionally, and use the new provenance surfaces to make “what do we trust?” an explicit operator habit.
Use the selector if you want the smallest correct offer for the current blocker instead of forcing a bigger architecture decision.
Start with activation if the gain you want is memory freshness, transcript hygiene, memory-health verification, and a conservative support baseline.