As OpenClaw goes viral, with over 100,000 GitHub stars, the security spotlight has intensified. While critics have labeled it a "security dumpster fire," the truth is more nuanced: OpenClaw is as safe as you make it. This guide covers the essential steps to harden your environment.
Understanding the Threat Model
OpenClaw is an autonomous agent. This means it can initiate actions on your behalf—deleting files, moving money, or sending emails. The primary risks include:
- Prompt Injection: Malicious input from a website or email could "trick" the agent into running unauthorized commands.
- Tool Poisoning: A malicious third-party skill could steal credentials or exfiltrate data.
- WebSocket Hijacking: If your gateway is exposed without a password, attackers could take full control.
Top 5 Hardening Steps
- Enable Sandboxing: Always run external tools (like browser subagents) in a Docker container or VM.
- Set Approval Gates: Configure OpenClaw to ask for permission before executing destructive commands (e.g.,
rm,delete,pay). - Audit Skills: Before installing a skill from ClawHub, check its
SKILL.mdand run a VirusTotal scan. - Use DM Pairing: Ensure only your specific user ID (on WhatsApp/Telegram) can control the agent.
- Run 'openclaw doctor': Regularly run this command to identify any insecure defaults.
# Check for security warnings
openclaw doctor --security-only
Recent CVEs and Patches
The OpenClaw Foundation has been rapid in its response to the 2026 security audits. Ensure you are on the Stable v3.4.2 or higher to mitigate recent WebSocket vulnerabilities.
Frequently Asked Questions
Yes, but only with human-in-the-loop verification. Never allow the agent to confirm payments automatically.
Meta banned OpenClaw on work devices due to the risk of code exfiltration from internal repositories. For personal use, these risks are manageable with private sandboxes.