What is OpenClaw
OpenClaw is an open-source autonomous AI agent framework that has rapidly become one of the most deployed agent platforms in the ecosystem. Originally released as Clawdbot, later renamed Moltbot, and now operating under the OpenClaw brand, the project has accumulated 145,000+ GitHub stars and 20,000+ forks -- figures that place it among the most popular open-source AI projects worldwide.
The framework operates across 20+ messaging platforms including WhatsApp, Telegram, Discord, Slack, and Microsoft Teams. It ships with 134+ MCP tools, a file-based memory system, and the ability to spawn sub-agents autonomously. In practical terms, a single OpenClaw instance can read your team's Slack channels, access your codebase, query your databases, and take actions across every connected service -- all without human-in-the-loop approval by default.
In February 2026, creator Peter Steinberger announced he was joining OpenAI, raising questions about the project's long-term governance and security posture. The community is large, but the security review infrastructure has not scaled with it.
Key context: OpenClaw is not a toy project. It is running in production environments at startups and enterprises alike, processing source code, credentials, internal documents, and customer data. The security incidents below should be assessed in that context.
The Security Incidents
Over the past several months, multiple independent security research teams have disclosed critical vulnerabilities in OpenClaw. Each incident is distinct, but together they reveal systemic gaps in the project's security architecture.
A 1-click RCE vulnerability via the Control UI WebSocket interface. An attacker can steal the authentication token through a crafted link, gaining full control of the agent instance. Internet-wide scanning identified 42,665 exposed instances, of which 5,194 were actively vulnerable at time of disclosure.
Approximately 1,000 publicly accessible instances were found running without any authentication. OpenClaw's default configuration trusts localhost connections, but many deployments expose the control interface to the internet via reverse proxies or cloud configurations without adding authentication layers.
Snyk analyzed 3,984 skills from ClawHub, the community skill registry. 36.82% contained security flaws, including command injection, path traversal, and credential exfiltration. 76 confirmed malicious payloads were identified, with 8 still publicly available at time of report.
CrowdStrike demonstrated that a crafted Discord message could inject instructions into an OpenClaw agent, causing it to leak private moderator discussions from other channels. The agent had no mechanism to distinguish between user input and injected commands.
Giskard identified multiple data leakage vectors: shared scopes between sessions allowed one user's data to bleed into another's context, and the Control UI token could be extracted by a compromised skill, granting full administrative access to the agent.
Cisco's security team analyzed 31,000 skills from the ClawHub ecosystem. 26% contained vulnerabilities ranging from insecure API key handling to arbitrary file read/write capabilities. No formal review process exists for skill submissions.
Pattern: These are not isolated findings from a single researcher. Six independent teams -- spanning startups, security vendors, and enterprise labs -- arrived at the same conclusion: OpenClaw's security model does not meet the requirements of production deployment.
Enterprise Risk Assessment
For organizations evaluating or already running OpenClaw, the incidents above translate into four primary risk categories.
The compounding nature of these risks is what makes OpenClaw deployments particularly challenging to secure. A supply chain attack via a malicious skill can lead to data exposure, which creates compliance violations, which enable lateral movement into connected systems. The attack surface is not additive -- it is multiplicative.
Mitigation Strategies
Organizations that need to continue running OpenClaw -- or that are evaluating it for future deployment -- should implement the following controls. These are not theoretical recommendations; they reflect the minimum security posture required to operate autonomous agents in a production environment.
How Oktsec Addresses These Risks
Oktsec was built specifically for this problem space: securing autonomous AI agent communication and deployment. For organizations running OpenClaw, we provide dedicated tooling that addresses every risk category identified above.
Dedicated OpenClaw Security Coverage
Oktsec ships with 15 OCLAW rules specifically designed for OpenClaw deployments, plus 6 NanoClaw audit checks for lightweight agent configurations. Our deployment audit runs 41 checks across OpenClaw, NanoClaw, and Oktsec configurations, generating SARIF-formatted output that integrates directly with GitHub Advanced Security, VS Code, and CI/CD pipelines.
The entire detection engine is built on Aguara, our open-source static analysis engine with 153+ rules spanning 15 security categories. Aguara scans every skill before deployment -- no LLM in the loop, fully deterministic, self-hosted. For runtime protection, Oktsec provides a forward proxy mode for Docker Sandboxes that intercepts, inspects, and logs all agent traffic.
Aguara Watch continuously monitors 31,000+ skills across 5 registries, providing early warning when new malicious or vulnerable skills appear. This is the same dataset that informed the Snyk and Cisco findings referenced above -- but running continuously, not as a one-time audit.
The Bottom Line
OpenClaw is a powerful framework with legitimate use cases. But its security model was designed for local development, not enterprise production. The incidents documented here are not edge cases -- they are the predictable result of deploying an agent with broad system access and minimal security controls.
For teams that need to run OpenClaw in production, the path forward is not to abandon the framework but to layer security around it: static analysis before deployment, runtime isolation during execution, cryptographic identity for every message, and a complete audit trail for every action.
That is exactly what Oktsec provides.
Secure your OpenClaw deployment
Oktsec provides static analysis, runtime isolation, agent identity, and audit trail for AI agent communication. Open source, self-hosted, no LLM.