🌐
Bitsight
bitsight.com › blog › openclaw-ai-security-risks-exposed-instances
OpenClaw Security: Risks of Exposed AI Agents Explained | Bitsight
February 9, 2026 - OpenClaw is gaining rapid adoption, but exposed instances introduce serious security and privacy risks. Learn how this AI agent expands cyber risk online.
🌐
Infosecurity Magazine
infosecurity-magazine.com › news › researchers-40000-exposed-openclaw
Researchers Find 40,000+ Exposed OpenClaw Instances - Infosecurity Magazine
February 9, 2026 - Some OpenClaw users have also been leaking API keys linked to third-party services via their control panels, further amplifying the impact of instances’ internet exposure.
Discussions

[D] We scanned 18,000 exposed OpenClaw instances and found 15% of community skills contain malicious instructions
https://www.trendingtopics.eu/security-nightmare-how-openclaw-is-fighting-malware-in-its-ai-agent-marketplace/ The developer of the AI assistant OpenClaw has now entered into a partnership with VirusTotal to protect the skill marketplace ClawHub from malicious extensions. I hope this partnership will improve the situation. I tinkered with OpenClaw agent in a VM, even let it on Moltbook, but I would not install it on my main PC. Too much risk. More on reddit.com
🌐 r/MachineLearning
28
131
February 12, 2026
Risks of using OpenClaw as you're own personal assistant, and who's doing it?
Yeah, giving an agent write access to email/calendar/files is a whole different risk profile than just using an LLM in a chat box. What helped me think about it is: start read-only, then add specific actions with tight scopes (per-folder, per-label, per-calendar), require confirmations for destructive ops, and log everything. Also, isolate the agent in a separate account where possible. This writeup on agent permissions and guardrails was a decent framework for the basics: https://www.agentixlabs.com/blog/ More on reddit.com
🌐 r/AI_Agents
14
3
February 2, 2026
Researchers Find Thousands of OpenClaw Instances Exposed to the Internet
AI bros don't know security, more news at 5. More on reddit.com
🌐 r/programming
53
324
February 1, 2026
Every OpenClaw security vulnerability documented in one place — relevant if you're running it with local models
Also known as OpenGape More on reddit.com
🌐 r/LocalLLaMA
7
14
February 18, 2026
🌐
Oasis
oasis.security › blog › openclaw-vulnerability
ClawJacked: OpenClaw Vulnerability Enables Full Agent Takeover
6 days ago - Earlier this month, researchers discovered over 1,000 malicious skills in OpenClaw's community marketplace (ClawHub) —fake plugins masquerading as crypto tools and productivity integrations that instead deployed info-stealers and backdoors.
🌐
Reddit
reddit.com › r/machinelearning › [d] we scanned 18,000 exposed openclaw instances and found 15% of community skills contain malicious instructions
r/MachineLearning on Reddit: [D] We scanned 18,000 exposed OpenClaw instances and found 15% of community skills contain malicious instructions
February 12, 2026 -

I do security research and recently started looking at autonomous agents after OpenClaw blew up. What I found honestly caught me off guard. I knew the ecosystem was growing fast (165k GitHub stars, 60k Discord members) but the actual numbers are worse than I expected.

We identified over 18,000 OpenClaw instances directly exposed to the internet. When I started analyzing the community skill repository, nearly 15% contained what I'd classify as malicious instructions. Prompts designed to exfiltrate data, download external payloads, harvest credentials. There's also a whack-a-mole problem where flagged skills get removed but reappear under different identities within days.

On the methodology side: I'm parsing skill definitions for patterns like base64 encoded payloads, obfuscated URLs, and instructions that reference external endpoints without clear user benefit. For behavioral testing, I'm running skills in isolated environments and monitoring for unexpected network calls, file system access outside declared scope, and attempts to read browser storage or credential files. It's not foolproof since so much depends on runtime context and the LLM's interpretation. If anyone has better approaches for detecting hidden logic in natural language instructions, I'd really like to know what's working for you.

To OpenClaw's credit, their own FAQ acknowledges this is a "Faustian bargain" and states there's no "perfectly safe" setup. They're being honest about the tradeoffs. But I don't think the broader community has internalized what this means from an attack surface perspective.

The threat model that concerns me most is what I've been calling "Delegated Compromise" in my notes. You're not attacking the user directly anymore. You're attacking the agent, which has inherited permissions across the user's entire digital life. Calendar, messages, file system, browser. A single prompt injection in a webpage can potentially leverage all of these. I keep going back and forth on whether this is fundamentally different from traditional malware or just a new vector for the same old attacks.

The supply chain risk feels novel though. With 700+ community skills and no systematic security review, you're trusting anonymous contributors with what amounts to root access. The exfiltration patterns I found ranged from obvious (skills requesting clipboard contents be sent to external APIs) to subtle (instructions that would cause the agent to include sensitive file contents in "debug logs" posted to Discord webhooks). But I also wonder if I'm being too paranoid. Maybe the practical risk is lower than my analysis suggests because most attackers haven't caught on yet?

The Moltbook situation is what really gets me. An agent autonomously created a social network that now has 1.5 million agents. Agent to agent communication where prompt injection could propagate laterally. I don't have a good mental model for the failure modes here.

I've been compiling findings into what I'm tentatively calling an Agent Trust Hub doc, mostly to organize my own thinking. But the fundamental tension between capability and security seems unsolved. For those of you actually running OpenClaw: are you doing any skill vetting before installation? Running in containers or VMs? Or have you just accepted the risk because sandboxing breaks too much functionality?

🌐
Digital Watch Observatory
dig.watch › home › updates › openclaw exploits spark a major security alert
OpenClaw exploits spark a major security alert | Digital Watch Observatory
February 23, 2026 - Multiple hacking groups have taken advantage of severe vulnerabilities to steal API keys, extract persistent memory data, and push information-stealing malware instead of leaving the platform’s expanding user base unharmed. Security analysts have linked more than 30,000 compromised instances to campaigns that intercept messages and deploy malicious payloads through channels such as Telegram...
🌐
Microsoft
microsoft.com › home › running openclaw safely: identity, isolation, and runtime risk
Running OpenClaw safely: identity, isolation, and runtime risk | Microsoft Security Blog
February 19, 2026 - Credentials and accessible data may be exposed or exfiltrated. The agent’s persistent state or “memory” can be modified, causing it to follow attacker-supplied instructions over time.
🌐
BleepingComputer
bleepingcomputer.com › home › news › security › clawjacked attack let malicious websites hijack openclaw to steal data
ClawJacked attack let malicious websites hijack OpenClaw to steal data
March 1, 2026 - Security researchers have disclosed a high-severity vulnerability dubbed "ClawJacked" in the popular AI agent OpenClaw that allowed a malicious website to silently bruteforce access to a locally running instance and take control over it.
🌐
Giskard
giskard.ai › knowledge › openclaw-security-vulnerabilities-include-data-leakage-and-prompt-injection-risks
OpenClaw security issues include data leakage & prompt injection
February 26, 2026 - This article explores the critical security failures of the OpenClaw agentic AI, which allowed sensitive data to leak across user sessions and IM channels. It examines how architectural weaknesses in the Control UI and session management created direct paths for prompt injection and unauthorized tool use. Finally, it outlines the essential hardening steps and systematic red-teaming strategies required to transform a vulnerable "fun bot" into a secure enterprise assistant.
Find elsewhere
🌐
Security Affairs
securityaffairs.com › 188749 › hacking › clawjacked-flaw-exposed-openclaw-users-to-data-theft.html
ClawJacked flaw exposed OpenClaw users to data theft
March 2, 2026 - “ClawJacked” flaw let malicious sites hijack OpenClaw AI agents to steal data; patch released in version 2026.2.26.
🌐
The Signal Cage
signalcage.com › home › news › 2026 › 17 › openclaw security crisis: 135,000 exposed instances and active infostealer campaigns — february 2026
OpenClaw Security Crisis: 135,000 Exposed Instances and Active Infostealer Campaigns — February 2026 - The Signal Cage
February 18, 2026 - OpenClaw Security Crisis: 135,000+ instances are now exposed and active Vidar infostealer campaigns stealing gateway tokens. Signal Cage breaks down what the OSINT data shows right now.
🌐
TechRadar
techradar.com › pro
Here are the OpenClaw security risks you should know about | TechRadar
4 days ago - Any website could steal your authentication token and run arbitrary code on your machine through a single malicious link. The vulnerability was patched in version 2026.1.29. Before that patch landed, Censys found over 21,000 OpenClaw instances ...
🌐
Kaspersky
kaspersky.com › blog › openclaw-vulnerabilities-exposed › 55263
New OpenClaw AI agent found unsafe for use | Kaspersky official blog
February 10, 2026 - These scripts — which mimicked trading bots, financial assistants, OpenClaw skill management systems, and content services — packaged a stealer under the guise of a necessary utility called “AuthTool”. Once installed, the malware would exfiltrate files, crypto-wallet browser extensions, seed phrases, macOS Keychain data, browser passwords, cloud service credentials, and much more. To get the stealer onto the system, attackers used the ClickFix technique, where victims essentially infect themselves by following an “installation guide” and manually running the malicious software. A security audit conducted in late January 2026 — back when OpenClaw was still known as Clawdbot — identified a full 512 vulnerabilities, eight of which were classified as critical.
🌐
Resilience
cyberresilience.com › home › openclaw went viral. so did its security vulnerabilities.
OpenClaw went viral. So did its security vulnerabilities. - Resilience
February 11, 2026 - DepthFirst researcher Mav Levin discovered CVE-2026-25253, a one-click remote code execution vulnerability that could compromise any OpenClaw instance in milliseconds. Simply visiting a malicious webpage was enough to trigger the attack chain, which exploited missing WebSocket origin validation to steal authentication tokens, disable sandboxing via the API, and achieve full host compromise.
🌐
Sophos
sophos.com › en-us › blog › the-openclaw-experiment-is-a-warning-shot-for-enterprise-ai-security
The OpenClaw experiment is a warning shot for enterprise AI security | SOPHOS
February 13, 2026 - This initial wave of enthusiasm was swiftly tempered by the security community highlighting the risks of giving agentic AI unfettered access to your local system (as well as personal data, credentials, and the keys to numerous cloud services ). Recent research suggests that over 30,000 OpenClaw instances were exposed on the internet, and threat actors are already discussing how to weaponize OpenClaw ‘skills’ in support of botnet campaigns.
🌐
The Hacker News
thehackernews.com › home › infostealer steals openclaw ai agent configuration files and gateway tokens
Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
February 17, 2026 - Infostealer malware stole OpenClaw AI agent files including tokens and keys, while exposed instances and malicious skills expand security risks.
🌐
Depthfirst
depthfirst.com › post › 1-click-rce-to-steal-your-moltbot-data-and-keys
depthfirst | 1-Click RCE To Steal Your OpenClaw Data and Keys (CVE-2026-25253)
February 1, 2026 - It does not work on locally-running OpenClaw instances. It does not bypass any defensive sandboxing or safety guardrails. It does not achieve arbitrary code execution. Here’s how I overcame those 3 limitations and demonstrated this vulnerability can be weaponized to achieve 1-Click remote code execution.
🌐
Utoronto
security.utoronto.ca › home › advisories › openclaw vulnerability notification
OpenClaw vulnerability notification - Information Security at University of Toronto
February 5, 2026 - On February 3, 2026, SecurityWeek published the first public disclosure describing how malicious website could steal a user’s authentication token and gain full control over the OpenClaw gateway through a one‑click remote code execution (RCE) attack. The vulnerability was patched shortly ...
🌐
Ars Technica
arstechnica.com › security › 2026 › 04 › heres-why-its-prudent-for-openclaw-users-to-assume-compromise
OpenClaw gives users yet another reason to be freaked out about security - Ars Technica
2 days ago - The word ‘privilege escalation’ undersells this: the outcome is full instance takeover.” · While fixed, the vulnerability means that thousands of instances may have been compromised without users having the slightest idea.
🌐
Cyber Security News
cybersecuritynews.com › home › cyber security › multiple hacking groups exploit openclaw instances to steal api key and deploy...
Multiple Hacking Groups Exploit OpenClaw Instances to Steal API key and Deploy Malware
February 22, 2026 - Flare analysts have observed over 30,000 compromised OpenClaw instances used to steal API keys, intercept messages, and distribute info-stealing malware via Telegram and other malicious communication channels.
🌐
Paio
paio.bot › blog › secure-openclaw-deployment-cyber-threats
Securing Your OpenClaw Deployment: What the CVEs Don't Tell You
1 week ago - One of the most serious vulnerabilities discovered in OpenClaw allowed attackers to hijack an instance through the browser, without needing a password or any direct access to the victim's machine.