WZ-IT Logo

Deploying OpenClaw Securely: Why 42,000 Instances Are Exposed Online – and How to Do It Right

Timo Wevelsiep
Timo Wevelsiep
#OpenClaw #Security #PromptInjection #GDPR #Hardening #SelfHosting #AI #OpenSource #VPN #Enterprise
Deploying OpenClaw Securely: Why 42,000 Instances Are Exposed Online – and How to Do It Right

Looking to run OpenClaw professionally and securely? WZ-IT deploys OpenClaw on isolated infrastructure in Germany – with VPN, SSO and 24/7 monitoring. Learn more about our OpenClaw expertise or schedule a consultation directly.

OpenClaw has accumulated over 170,000 GitHub stars in just a few weeks, making it one of the fastest-growing open-source projects in history. The autonomous AI agent can process emails, manage calendars, deploy code and execute tasks independently – all via WhatsApp, Telegram, Slack or a dozen other channels.

The problem: The security landscape is catastrophic.

Security researchers have found over 42,000 unprotected OpenClaw instances on the public internet. A critical vulnerability (CVE-2026-25253) enables one-click remote code execution. And on the official skill marketplace ClawHub, 341 skills were identified that actively distribute malware (The Hacker News).

This article analyzes the concrete risks – and provides a practical hardening checklist for secure operations.

Table of Contents

What Makes OpenClaw Different – and Why That's Dangerous

OpenClaw is not a chatbot. It is an autonomous agent with full system access. This fundamentally distinguishes it from tools like ChatGPT or Claude, which are limited to conversations.

The "Lethal Trifecta"

Security researchers from ToxSec and Dark Reading have described the core risks as the "Lethal Trifecta" (Dark Reading):

Risk Factor What It Means
Private data access File system, SSH keys, .env files, emails, chat histories, browser profiles
Processing external content Emails, web pages, documents, Slack messages – all potentially manipulated
External communication The agent can send emails, make HTTP requests, post Slack messages

Added to this is a fourth dimension: Persistent memory. OpenClaw retains context across sessions in a SQLite database. This enables attacks that are fragmented over days or weeks and only assemble at execution time – known as memory poisoning (Trend Micro).

Heartbeat: Autonomous Execution Without Confirmation

The heartbeat system checks every 30 minutes for pending tasks and executes them without explicit confirmation. This makes the agent proactive – but also vulnerable to time-based attacks. A payload injected into persistent memory can manipulate the HEARTBEAT.md file and establish a persistent backdoor that fires every 30 minutes (OpenClaw Docs).

Prompt Injection: When an Email Takes Over the Agent

Prompt injection is the most severe risk for OpenClaw deployments. Since the agent reads and processes external content from emails, documents, web pages and chat messages, attackers can inject manipulated instructions.

How Attacks Work

Security researchers at Zenity demonstrated a proof of concept: A crafted Google Document contained hidden instructions that caused OpenClaw to create a new Telegram bot integration under the attacker's control. From that point, the attacker could send commands through the new channel – without the user receiving any notifications (eSecurity Planet).

A journalist from Android Authority reported hacking his own computer via prompt injection in OpenClaw, describing it as "terrifyingly easy" (Android Authority).

The Multi-Channel Amplification Problem

OpenClaw processes content from 10+ channels simultaneously. A single manipulated support email could theoretically:

  1. Query customer records from the database
  2. Trigger fraudulent refunds
  3. Post Slack messages to mask the activity

The combination of broad system access and missing sandboxing turns every communication channel into a potential attack vector (Cisco Blogs).

42,000 Exposed Instances: The Gateway Problem

Within a week of OpenClaw's viral growth, security researchers found over 42,000 unprotected gateway instances on the public internet (CyberSecurity News).

Why So Many Instances Are Exposed

The OpenClaw gateway is designed as a local service – port 18789 on localhost. Many users accidentally expose it through:

  • Missing firewall rules (UFW not configured)
  • Open ports in cloud security groups (AWS, Hetzner)
  • Reverse proxies without authentication
  • Docker containers binding ports directly to the network

The results are alarming: 93.4% of publicly reachable instances had critical authentication bypass vulnerabilities (JFrog).

What Attackers See

Anyone gaining access to an exposed gateway can:

  • Read API keys and OAuth tokens
  • Access private chat histories and emails
  • Execute arbitrary shell commands on the host
  • Read, modify and exfiltrate files
  • Use the agent as a proxy for further attacks

CVE-2026-25253: One-Click Remote Code Execution

In January 2026, CVE-2026-25253 was published – a critical vulnerability (CVSS 8.8) in the Control UI. The UI accepted the gatewayUrl parameter from the query string without validation and connected automatically, sending the stored token in the process.

Result: A single crafted link was enough to send the gateway token to an attacker-controlled server and take over the entire system. Patched in version 2026.1.29 (SOCRadar).

ClawHub: 341 Skills Distributing Malware

ClawHub is OpenClaw's official extension marketplace – comparable to a plugin store. Security researchers from Koi Security audited all 2,857 available skills and found 341 actively malicious entries (The Hacker News).

The "ClawHavoc" Campaign

335 of the malicious skills distributed the Atomic macOS Stealer (AMOS) – an infostealer sold on criminal marketplaces for $500-1,000/month. AMOS extracts:

  • Browser credentials and cookies
  • Keychain passwords
  • Crypto wallet data
  • SSH keys
  • Files from the home directory

The skills had professional documentation and plausible names: solana-wallet-tracker, youtube-summarize-pro, polymarket-trader.

7.1% of All Skills Leak Credentials

Independent of the ClawHavoc campaign, Snyk found that 283 additional skills (7.1% of the registry) contained vulnerabilities that expose sensitive credentials (The Register).

The lesson: No skill should be installed without manual code review.

CLOUD Act & GDPR: When the Agent Uses Cloud LLMs

OpenClaw itself is just the "hand" – the language model is the "brain." When configured with GPT-4, Claude or another US-hosted service as the backend, all prompts and context data are transmitted to US providers.

This directly conflicts with European data protection law:

  • The CLOUD Act allows US authorities to access data from US companies – regardless of server location
  • The GDPR requires a legal basis for transfers to third countries
  • The EU AI Act (effective August 2, 2026) tightens obligations for autonomous AI systems

Organizations processing sensitive business or customer data through OpenClaw while using a US API as the LLM backend face a fundamental compliance problem.

The alternative: Local models via Ollama (Llama 3.3 70B, Mistral Large, Qwen 2.5) on dedicated GPU infrastructure – no data transfer, full GDPR compliance. Read more in our article on AI sovereignty.

Hardening Checklist: Deploying OpenClaw Securely

The following measures significantly reduce the attack surface. They are based on official documentation, independent security audits and our own deployment experience (OpenClaw Docs, Adversa AI).

Network

Measure Priority Details
Bind gateway to localhost Critical Never use 0.0.0.0. Port 18789 only on 127.0.0.1
VPN for remote access Critical Tailscale, WireGuard or SSH tunneling instead of open ports
Firewall rules Critical UFW: Block gateway port at the firewall level
Network segmentation High OpenClaw in its own VLAN/subnet – isolated from production systems
No shared hosting High Never run OpenClaw on the same host as databases or backend services

Authentication & Secrets

Measure Priority Details
Enable token auth Critical Mandatory when the gateway is active
Tokens via environment variables Critical Never store in files on disk
No secrets in HEARTBEAT.md Critical Becomes part of the prompt context – sent to LLM provider
Credential rotation High Regularly rotate all API keys, tokens and OAuth grants
Use a secrets manager Recommended HashiCorp Vault, Bitwarden CLI or similar

Host Hardening

Measure Priority Details
Dedicated non-root user Critical Minimal system privileges
Full-disk encryption High LUKS or dm-crypt on the gateway host
SSH hardening High Key-only auth, root login disabled, fail2ban active
File permissions High 700 on directories, 600 on files
Automatic updates Recommended Unattended-upgrades for security patches

Skill Vetting

Measure Priority Details
Code review before installation Critical Manually review every SKILL.md for shell commands
Verified publishers only High No skills from unknown ClawHub accounts
Pin skill versions High No automatic updates of unreviewed skills

Monitoring & Governance

Measure Priority Details
Log all agent actions Critical Review regularly – especially after heartbeat cycles
API budget limits High Cap LLM costs to detect runaway heartbeats
Maintain AI inventory High Centrally track all OpenClaw deployments (prevent shadow AI)
Define bounded autonomy Recommended Clearly specify where the agent can act independently and where it cannot

Our Approach at WZ-IT

When deploying OpenClaw for enterprises, we implement a multi-layered security architecture:

  • Isolated infrastructure: Dedicated VMs in German data centers – no shared hosting environments, no multi-tenant risks.
  • Network isolation: VPN-only access via Tailscale or WireGuard. No gateway port is publicly reachable.
  • SSO integration: Authentication via Authentik or Keycloak – no local passwords.
  • Local LLMs: When desired, we deploy Ollama with Open WebUI on dedicated GPU servers – no data transfer to US providers.
  • 24/7 monitoring: Automated monitoring of all agent actions, heartbeat cycles and API costs. Alerting on anomalies.
  • Security updates: Regular patches and skill audits included.

We see ourselves as an extension of your IT team – not a black box.


Further Reading


Sources

Frequently Asked Questions

Answers to important questions about this topic

OpenClaw can be operated securely – but requires consistent hardening. Without measures like VPN, token auth and network isolation, the attack surface is significant: CVE-2026-25253, prompt injection via emails and 42,000+ exposed instances demonstrate the risks.

Prompt injection is an attack where attackers place manipulated content (e.g., in emails, documents, chat messages) that OpenClaw interprets and executes as instructions – including file access, credential theft or backdoor installation.

Many users accidentally expose the gateway through open ports, missing firewall rules or insecure reverse proxy configurations. 93.4% of publicly reachable instances had critical auth bypass vulnerabilities according to security researchers.

Bind the gateway to localhost, use VPN for remote access (Tailscale, WireGuard), enable token auth, use a dedicated non-root user, enable full-disk encryption, set firewall rules and manually review all ClawHub skills before installation.

A critical vulnerability (CVSS 8.8) in OpenClaw's Control UI that enables one-click remote code execution. A single crafted link is enough to steal the gateway token and fully compromise the system. Patched in version 2026.1.29.

Yes. We deploy OpenClaw on isolated infrastructure in German data centers – with VPN, SSO, network segmentation, monitoring and regular security updates. Including 24/7 monitoring and SLA.

Timo Wevelsiep

Written by

Timo Wevelsiep

Co-Founder & CEO

Co-Founder of WZ-IT. Specialized in cloud infrastructure, open-source platforms and managed services for SMEs and enterprise clients worldwide.

LinkedIn

Let's Talk About Your Idea

Whether a specific IT challenge or just an idea – we look forward to the exchange. In a brief conversation, we'll evaluate together if and how your project fits with WZ-IT.

Trusted by leading companies

  • Rekorder
  • Keymate
  • Führerscheinmacher
  • SolidProof
  • ARGE
  • Boese VA
  • NextGym
  • Maho Management
  • Golem.de
  • Millenium
  • Paritel
  • Yonju
  • EVADXB
  • Mr. Clipart
  • Aphy
  • Negosh
Timo Wevelsiep & Robin Zins - CEOs of WZ-IT

Timo Wevelsiep & Robin Zins

CEOs of WZ-IT

1/3 – Topic Selection33%

What is your inquiry about?

Select one or more areas where we can support you.