Bug type
Behavior bug (incorrect output/state without crash)
Summary
Description
All exec() and read() tool calls are being corrupted with </arg_value>> suffix on Windows.
Environment
- OS: Windows 10 (NT 10.0.19041 x64)
- Shell: PowerShell
- Node.js: v25.2.1
- Platform: Windows_NT
Reproduction
User input: echo "test"
Actual executed: echo "test</arg_value>> ← Suffix appended!
Impact
🔴 Critical - Blocks all file operations and command execution on Windows.
Attachments
Full analysis in workspace docs if needed.
Please patch at serialization/injection layer.
Steps to reproduce
local host
Expected behavior
nothing
Actual behavior
Blocks all file operations and command execution on Windows
OpenClaw version
2026.3.11
Operating system
windows 10
Install method
pnpm
Model
dashscope/qwen3.5-flash
Provider / routing chain
openclaw-dashscope/qwen3.5-flash
Config file / key location
No response
Additional provider/model setup details
No response
Logs, screenshots, and evidence
Impact and severity
No response
Additional information
No response
Bug type
Behavior bug (incorrect output/state without crash)
Summary
Description
All
exec()andread()tool calls are being corrupted with</arg_value>>suffix on Windows.Environment
Reproduction
User input:
echo "test"Actual executed:
echo "test</arg_value>>← Suffix appended!Impact
🔴 Critical - Blocks all file operations and command execution on Windows.
Attachments
Full analysis in workspace docs if needed.
Please patch at serialization/injection layer.
Steps to reproduce
local host
Expected behavior
nothing
Actual behavior
Blocks all file operations and command execution on Windows
OpenClaw version
2026.3.11
Operating system
windows 10
Install method
pnpm
Model
dashscope/qwen3.5-flash
Provider / routing chain
openclaw-dashscope/qwen3.5-flash
Config file / key location
No response
Additional provider/model setup details
No response
Logs, screenshots, and evidence
Impact and severity
No response
Additional information
No response