In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.
Start learningUpgrade @openclaw/nostr to version 2026.2.19 or higher.
@openclaw/nostr is an OpenClaw Nostr channel plugin for NIP-04 encrypted DMs
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the URL ingestion process. An attacker can access internal or private network resources by crafting a URL containing an ISATAP IPv6 literal that embeds a private IPv4 address, thereby bypassing hostname/IP filtering in URL-fetching paths.