Resources / Current release review
OpenClaw 2026.5.7 is a governance + delivery-correctness maintenance release. The useful operator signal is not “memory is broadly solved” — it is that global toggles and auto-actions are harder to misapply, delivery outcomes are harder to misreport as successful, and the channel surface is a bit easier to diagnose without widening permissions. You also get a concrete WhatsApp reliability fix for proactive sends to LID-addressed contacts. Treat this as safer operating posture and cleaner evidence — not as permission to relax governed rollout gates.
before-tool-call authorization path is intentionally allowing it. Fix by tightening policy, not by widening bypasses.deliverySucceeded=false when an adapter returns no result. Update dashboards and runbooks that treated “no error” as proof of delivery.openclaw channels list is now channel-only by default (use --all for bundled/catalog), and cron JSON now includes computed status.PermissionRequest prompts are handled more cleanly (including remembered “allow-always” for identical requests), and plugin approval UIs should stop offering stale actions.deliverySucceeded=false when an adapter returns no result, so “claimed delivery” stops masquerading as a successful send.status, and channel list output is clearer about installed/configured/enabled state (with --all for bundled/catalog)./new and sessions.reset so long-lived channel sessions rebuild the visible skill list after skills change.openai/chat-latest API-key override for testing the moving “chat-latest” alias without changing the stable default model.deliverySucceeded=false reduces false confidence and wasted debugging cycles.
openai/chat-latest is a test knob, not an operator promise.openai/chat-latest, do it in a bounded environment with rollback, and keep the stable default model pinned.| If you are... | This release matters because... |
|---|---|
| running governed rollouts with any auto-action surface | auto-reply tool dispatch now routes through authorization hooks, making silent widening harder |
| operating WhatsApp for proactive outreach or notifications | proactive sends route through LID forward mappings when available, reducing no-delivery/ghost-chat incidents |
| doing support triage off delivery metrics and logs | delivery is less likely to be misreported as success when adapters return no result |
| running scripts against channels/crons/status | cron JSON includes status and channels list output is clearer, but scripts may need updates |
If the issue is delivery proof, channel posture, runbook clarity, or first safe activation checks, start with the OpenClaw Native Memory Activation Kit. This release is mostly about making the “prove the lane is healthy” checklist less misleading.
If memory already works and the problem is trust tiers, scoped promotion, file-write governance, or public-action boundaries, use the OpenClaw Discernment Control Kit.
If runtime health, channels, memory, approvals, and support loops are tangled together, use the OpenClaw Memory Architecture Bundle.
OpenClaw 2026.5.7 is worth treating as the safer baseline because it tightens the governance surface (admin-scoped global memory toggles, authorization-gated auto-actions), reduces “optimistic success” delivery reporting, and fixes a real WhatsApp proactive-send reliability edge case. The right response is not to widen autonomy — it is to keep the same conservative checklist, now with cleaner evidence: version, channel state, a real send/receive proof, delivery result truthiness, and retrieval probes before you treat the lane as safe.
Use the Production Safety Checklist when you need to separate gateway, model-auth, memory, approval, and rollback health before widening.
Start with the activation kit if the main problem is upgrade safety, channel proof, config health checks, or first safe native-memory activation.