Is OpenClaw Safe? Lessons from the Moltbot Security Incidents
OpenClaw security risks exposed: 40,000+ instances vulnerable, three CVEs published. Learn from verified security reports and protect your AI agent.
Is OpenClaw Safe? Lessons from the Moltbot Security Incidents
OpenClaw promises to be your "personal AI assistant that actually does things." It can clear your inbox, send emails, manage your calendar, and execute code on your machine. But in February 2026, security researchers discovered something alarming: over 40,000 OpenClaw instances were exposed to the public internet, many vulnerable to remote code execution.
If you are considering OpenClaw for your business or personal workflow, you need to understand what went wrong and how to avoid becoming a security headline.
The Timeline: From Viral Sensation to Security Crisis
November 2025: Clawdbot Launches
Peter Steinberger—founder of PSPDFKit, the PDF framework used by Apple on over a billion devices—released Clawdbot as an open-source side project. It gained 60,000 GitHub stars in 72 hours. The premise was simple: a local AI agent that connects to messaging apps to automate real tasks.
January 26, 2026: The Moltbot Rebrand
Anthropic sent a trademark notice. "Clawdbot" was too similar to "Claude." The project rebranded to Moltbot (referencing lobsters molting). Three days later, on January 29, it became OpenClaw after completing trademark searches.
February 9, 2026: The SecurityScorecard Bombshell
SecurityScorecard's STRIKE threat intelligence team published research revealing 40,214 exposed OpenClaw instances across 28,663 unique IP addresses. The situation was worse than exposed dashboards:
- 63% of deployments were vulnerable
- 12,812 instances exploitable via remote code execution
- 549 instances correlated with prior breach activity
- 1,493 associated with known vulnerabilities
By February 11, The Register reported the number had grown to over 135,000 exposed instances.
Verified Vulnerabilities (CVEs)
Three high-severity CVEs have been published against OpenClaw:
CVE-2026-25253 (CVSS 8.8)
A one-click remote code execution vulnerability. Attackers can create malicious links that steal authentication tokens and grant full control over the AI agent—even when running on localhost.
CVE-2026-25157 (CVSS 7.8)
SSH command injection in the macOS app. A malicious project or skill can inject commands through SSH operations.
CVE-2026-25254 (CVSS 7.5)
API key exposure through log files. Conversation histories and configuration data were being written to accessible locations.
Why These Vulnerabilities Happened
Default Configuration: Gateway on 0.0.0.0
By default, OpenClaw's gateway service binds to 0.0.0.0 (all network interfaces) instead of 127.0.0.1 (localhost only). Users who did not manually change this setting exposed their control panels to the entire internet.
The Skills Supply Chain Problem
ClawHub hosts 5,705 community-built skills. Security audits have flagged 396 as potentially malicious. Unlike app stores, there is no rigorous review process. Skills are code that runs on your machine with your permissions.
Deep System Access
OpenClaw requires elevated permissions to be useful. It can read files, execute commands, access browsers, and control applications. This is the feature that makes it powerful—and dangerous when compromised.
6 Essential Security Steps (Verified)
Step 1: Bind Gateway to Localhost Only
Verify your gateway configuration:
``` openclaw gateway status ```
Must show: 127.0.0.1:18789 Must NOT show: 0.0.0.0
If exposed, edit `~/.openclaw/config/clawdbot.json`:
``` { "gateway": { "host": "127.0.0.1", "port": 18789 } } ```
Step 2: Update to Patched Versions
Ensure you are running OpenClaw v2026.1.2 or later, which patches CVE-2026-25253 and CVE-2026-25157. Check your version:
``` openclaw --version ```
Step 3: Enable Approval Workflows
Configure execution approval for sensitive actions:
``` { "gateway": { "approvalRequired": true, "approvalActions": [ "file.delete", "file.write", "shell.execute", "email.send" ] } } ```
Step 4: Vet Every Skill Before Installing
Before installing from ClawHub:
- Check the VirusTotal security scan (OpenClaw partners with VirusTotal)
- Review source code on GitHub
- Test in Docker sandbox first
- Avoid cryptocurrency/financial automation skills (672 flagged as high-risk)
Step 5: Use Network Isolation
Run OpenClaw on an isolated network segment or VLAN. Never expose it directly to the internet. If you need remote access, use Tailscale or a VPN—never port forwarding.
Step 6: Monitor for Exfiltration
Check conversation logs and memory files regularly. Look for:
- Unexpected API calls
- Large data transfers
- Unusual file access patterns
- Commands you did not approve
The Verdict: Is OpenClaw Safe?
OpenClaw is as safe as your configuration. The February 2026 incidents were not sophisticated attacks—they were configuration errors at scale. 135,000 exposed instances represents a systemic failure of default settings and user education.
OpenClaw can be safe IF you:
- Bind to localhost only (not 0.0.0.0)
- Keep updated with security patches
- Enable approval workflows
- Vet skills before installing
- Run on isolated networks
OpenClaw is dangerous IF you:
- Use default gateway settings
- Install skills without review
- Expose ports to the internet
- Skip updates
- Run on production systems without hardening
Before installing, understand . If you proceed, follow our . Once hardened, explore .
The power of AI agents comes with responsibility. The February 2026 security crisis proves that convenience without security is a recipe for disaster.
Sources:
- SecurityScorecard STRIKE Report (February 9, 2026)
- The Register (February 9, 2026)
- MITRE CVE Database (CVE-2026-25253, CVE-2026-25157, CVE-2026-25254)
How Not to Build an Agent: Part 1 of Building Agents That Do Real Work
Most agents collapse the moment they leave the demo. Here is why, and the mistakes every team keeps making.
Why Your Traditional Dev Agency Is Terrified of AI (And They Should Be)
The billable hour model is dead. Agencies that sell time are fundamentally misaligned with AI efficiency.
Stop Building Chatbots. Start Building Workflows.
Nobody wants to chat with your brand. Users want results, not conversation. The best AI is invisible.
Why 90% of AI Startups Will Fail in 2026: The Wrapper Trap
If OpenAI releases your feature next week, do you have a moat? Most don't. Here is how to survive.