Resources / Archive release review
OpenClaw 2026.5.6 is a hotfix baseline: it undoes a 2026.5.5 doctor --fix repair that could rewrite valid Codex OAuth routes
(openai-codex/*) to openai/*, breaking OAuth-only GPT-5.5 setups or silently shifting operators onto the API-key route.
It also hardens plugin and web fetch handling so “it should work” requests fail less often and timed-out fetches don’t leave tool lanes stuck.
Treat this as operability and recovery hygiene — not as permission to widen lanes or relax governed rollout gates.
doctor --fix, re-check Codex OAuth routing: 2026.5.6 reverts a repair that could rewrite valid openai-codex/* routes to openai/*. If your default model changed, set openai-codex/gpt-5.5 again and run openclaw config validate.fetch/Headers, so symbol metadata on caller-owned objects stops breaking otherwise valid plugin requests.Invalid reasoning effort) carried forward into 2026.5.6.openclaw/plugin-sdk/*.docker-compose.yml drops NET_RAW/NET_ADMIN and enables no-new-privileges, shrinking the default container capability surface.doctor --fix change that could rewrite valid openai-codex/* routes to openai/*, which can break OAuth-only GPT-5.5 setups or shift operators onto the API-key route.fetch/Headers calls, so SDK and guarded/proxy fetch paths stop rejecting valid requests.off, preventing a hard failure when the provider rejects unsupported fields./steer are routed through normal authorization/mention gates instead of being dropped, and streaming progress drafts keep useful reasoning text visible.no-new-privileges, tightening the baseline for containerized rollouts.doctor --fix changes routing or a plugin fetch path rejects a request for non-obvious reasons, operators lose time proving whether the lane is actually unhealthy or just misconfigured. 2026.5.6 removes a sharp edge that can break OAuth-only Codex setups and hardens fetch paths that otherwise fail in ways that look like “AI quality” problems.
doctor --fix as a repair surface that deserves a post-run validation pass (provider route, default model, config validate), not as a “press and forget” button.| If you are... | This release matters because... |
|---|---|
| running Discord, WhatsApp, Matrix approvals, or multi-channel ops | channel-operability fixes reduce false reconnect loops, stalled command replies, and stranded approvals |
| operating Grok models through OpenClaw | native Grok live runs stop failing on unsupported reasoning-effort controls |
| supporting many plugin-based installs | official plugin syncing + managed peer-link repair reduce “upgrade broke unrelated plugin” incidents |
| operating via Docker | the default compose hardening shrinks the container capability surface without changing your config |
| doing governed rollouts with tight runbooks | better doctor/status evidence helps you distinguish true degradation from transient or misclassified signals |
If the issue is channel reliability proof, plugin install/update stability, support triage, or first safe activation checks, start with the OpenClaw Native Memory Activation Kit. This release makes the “prove the lane is healthy” checklist less brittle, especially for Discord/WhatsApp/operator tooling.
If memory already works and the problem is trust tiers, scoped promotion, file-write governance, or public-action boundaries, use the OpenClaw Discernment Control Kit.
If runtime health, channels, memory, approvals, and support loops are tangled together, use the OpenClaw Memory Architecture Bundle.
OpenClaw 2026.5.6 is the safer maintenance baseline because it fixes a 2026.5.5 recovery regression that can break Codex OAuth routing and it hardens fetch behavior. You still also get the broader 2026.5.5 operability wins: fewer Grok reasoning-effort rejects, fewer Discord reconnect ambiguities, fewer WhatsApp reset stalls, fewer stranded approvals, and less plugin drift. The right response is not to widen autonomy — it is to tighten your proof checklist: version, plugin state, deep status, a real send/receive proof, and exact retrieval probes before you treat the lane as safe.
Use the Production Safety Checklist when you need to separate gateway, model-auth, memory, approval, and rollback health before widening.
Start with the activation kit if the main problem is upgrade safety, channel proof, plugin/config health checks, or first safe native-memory activation.