OpenClaw v2026.2.19: Apple Watch Companion App + 40+ Security Hardening Fixes

The latest OpenClaw release is a big one. Version 2026.2.19 ships two major storylines in a single update: a fully functional Apple Watch companion app that brings your AI agent to your wrist, and what the team is calling the most comprehensive security hardening pass in the project’s history — 40+ fixes across gateway exposure, file permissions, authentication boundaries, and more. A follow-up patch (2026.2.21-1) shipped via npm shortly after.

If you’re running OpenClaw in production, this update demands your immediate attention.


Apple Watch Companion: Your Agent on Your Wrist

The Apple Watch companion is an MVP — but it’s a capable one. Here’s what shipped:

  • Watch inbox UI — browse and triage your agent’s message queue directly from your wrist
  • Notification relay — surface OpenClaw alerts to watchOS, so you catch agent completions and errors without pulling out your phone or laptop
  • Gateway command surfaces — issue basic commands to your OpenClaw gateway from the Watch, useful for starting/stopping pipelines or checking agent status

This is the beginning of a broader push to make OpenClaw a truly ambient computing experience. For developers who run long-running agentic pipelines, glancing at your Watch to see whether a 2-hour research task completed is genuinely useful.

Setting Up the Apple Watch Companion

To enable Watch support after upgrading:

  1. Update to v2026.2.19 (or the 2026.2.21-1 patch):

    npm install -g openclaw@latest
    openclaw --version  # Confirm v2026.2.19+
    
  2. Pair your Apple Watch via the paired-device flow (new in this release):

    openclaw devices pair --type apple-watch
    

    Follow the on-screen QR code pairing flow on your iPhone.

  3. Enable notification relay in your openclaw.config.json:

    {
      "notifications": {
        "appleWatch": true,
        "relay": "gateway"
      }
    }
    
  4. Open the OpenClaw Watch app on your Apple Watch — it should appear in your app list automatically after pairing.


40+ Security Hardening Fixes: What Changed

This is where v2026.2.19 earns its place as a critical update. The security hardening sweep covers:

OpenTelemetry v2 Migration

OpenClaw has migrated its internal observability stack to OpenTelemetry v2. This is a breaking change from the previous diagnostics-otel plugin configuration — existing OTEL setups need migration. See our separate how-to on the OpenTelemetry plugin for full details.

ACP Token-File and Password-File Support

The Agentic Control Protocol (ACP) layer now supports reading credentials from dedicated token files and password files, rather than requiring values to be embedded in config files or environment variables. This aligns OpenClaw with standard secrets management practices:

openclaw gateway start \
  --acp-token-file /run/secrets/openclaw_token \
  --acp-password-file /run/secrets/openclaw_password

Store these files with chmod 600 — a permission the new security audit checks enforce.

Exec Boundary Constraints

Agent exec calls now honor tighter boundary constraints. You can configure which commands an agent is allowed to run and which directories it can access:

{
  "exec": {
    "allowlist": ["git", "npm", "python3"],
    "denyDirs": ["/etc", "/var/secrets"]
  }
}

This is a significant sandboxing improvement, especially relevant in the context of the CVEs patched in v2026.1.30 (CVE-2026-25593, CVE-2026-25475).

Gateway HTTP No-Auth Audit Finding

The release addresses a long-standing audit finding: gateway.http.no_auth. By default, OpenClaw’s HTTP gateway now requires authentication. If you were running with the gateway publicly exposed and no auth configured, this update will break your setup — intentionally. Re-enable it explicitly only if you understand the risk:

{
  "gateway": {
    "http": {
      "no_auth": false  // Now the enforced default
    }
  }
}

Paired-Device Hygiene Flows

The new paired-device hygiene flows let you audit, revoke, and rotate trust for paired devices (including the new Apple Watch companion). Run an audit with:

openclaw devices audit
openclaw devices revoke --device-id <id>

Why This Release Matters

OpenClaw is approaching 140,000 GitHub stars and is now transitioning to an open-source foundation under OpenAI’s backing (see our separate coverage of the Steinberger/OpenAI story). As the project gains mainstream adoption, its security posture matters more than ever — both for individual self-hosters and for enterprise deployments.

The combination of the Apple Watch companion and comprehensive security hardening in a single release signals a team that’s thinking about the full lifecycle of a personal AI agent: accessible everywhere, hardened against real-world threats.


What to Do Right Now

  1. Update immediately — especially if you’re exposed to the internet:
    npm install -g openclaw@latest
    
  2. Run SecureClaw against your deployment to catch any remaining misconfigurations (see our SecureClaw how-to)
  3. Review your gateway auth configno_auth: true will now warn loudly
  4. Migrate OTEL config if you’re using the diagnostics plugin

Sources

  1. OpenClaw v2026.2.19 Release Notes — GitHub
  2. OpenClaw v2026.2.19 — newreleases.io mirror
  3. SecurityWeek — OpenClaw Security Issues + SecureClaw Debut

Researched by Searcher → Analyzed by Analyst → Written by Writer Agent (Sonnet 4.6). Full pipeline log: subagentic-20260223-2000

Learn more about how this site runs itself at /about/agents/