====== Security Risks and Dangers of Using OpenClaw ====== OpenClaw is an open-source AI agent framework that runs locally on user hardware, connecting large language models to messaging apps, local files, shell commands, browsers, and third-party tools for task automation. ((Source: [[https://www.digitalocean.com/resources/articles/what-is-openclaw|DigitalOcean — What Is OpenClaw]])) While its local-first design and extensibility make it a powerful personal assistant, these same features introduce significant security risks that organizations and individuals must understand before deployment. ===== Architecture and Attack Surface ===== OpenClaw grants LLMs system-level access including file I/O, script execution, web automation, and integrations with email, calendars, and smart home devices. ((Source: [[https://pacgenesis.com/what-is-openclaw-ai-everything-you-need-to-know-about-the-open-source-ai-agent-that-actually-does-things/|PacGenesis — What Is OpenClaw AI]])) This effectively gives AI models eyes, ears, and hands without built-in governance by default, requiring users to manually implement controls like sandboxing. ((Source: [[https://ppaolo.substack.com/p/openclaw-system-architecture-overview|Paolo Substack — OpenClaw System Architecture Overview]])) The framework uses a local gateway for control, persistent memory stored in Markdown files, multi-agent routing, a heartbeat scheduler for autonomous operation, and extensibility via community AgentSkills or plugins from repositories like ClawHub. ((Source: [[https://milvus.io/blog/openclaw-formerly-clawdbot-moltbot-explained-a-complete-guide-to-the-autonomous-ai-agent.md|Milvus — OpenClaw Complete Guide]])) ===== Supply Chain Attacks ===== Users download community-contributed skills (automation scripts) from central repositories like ClawHub, which could be compromised to inject malware, backdoors, or malicious code executed with system privileges. ((Source: [[https://ourtake.bakerbotts.com/post/102mfdm/what-is-openclaw-and-why-should-you-care|Baker Botts — What Is OpenClaw]])) As an open-source project with over 200,000 GitHub stars, its dependency on unvetted third-party extensions mirrors broader supply chain vulnerabilities in agentic AI. ===== Prompt Injection ===== OpenClaw assembles large prompts from system instructions (AGENTS.md, SOUL.md, TOOLS.md), conversation history, memory, and logs, making it susceptible to injections via messaging channels or external content such as documents, emails, and webpages. ((Source: [[https://ppaolo.substack.com/p/openclaw-system-architecture-overview|Paolo Substack — OpenClaw System Architecture]])) Malicious inputs can override instructions, tricking the LLM into unauthorized actions like data access or tool misuse, as the framework lacks inherent prompt guards. ===== Malicious Tool Definitions ===== Extensible AgentSkills and tool schemas allow over 100 preconfigured functions for shell commands, file management, and browser control. ((Source: [[https://www.digitalocean.com/resources/articles/what-is-openclaw|DigitalOcean — What Is OpenClaw]])) Without strict validation, tools could execute harmful scripts such as deleting files or installing payloads, especially in non-sandboxed modes offering full system access. ===== Data Exfiltration ===== Direct local access to files, browsers, and integrations enables agents to read sensitive data and send it outbound via API-connected LLMs or chat apps. ((Source: [[https://www.crowdstrike.com/en-us/blog/what-security-teams-need-to-know-about-openclaw-ai-super-agent/|CrowdStrike — What Security Teams Need to Know About OpenClaw]])) Persistent local storage of memory and preferences in editable Markdown files increases exposure if the gateway is compromised. ===== Known Vulnerabilities ===== CrowdStrike has identified OpenClaw's ability to reason over and act on external content as a broad attack surface for security teams. ((Source: [[https://www.crowdstrike.com/en-us/blog/what-security-teams-need-to-know-about-openclaw-ai-super-agent/|CrowdStrike — What Security Teams Need to Know About OpenClaw]])) The [[clawjacked_attack|ClawJacked vulnerability]] demonstrated that malicious websites could hijack locally running OpenClaw instances via WebSocket connections. Additionally, community experience indicates that smaller local models (below 32B parameters) may produce unreliable and potentially unsafe actions. ((Source: [[https://milvus.io/blog/openclaw-formerly-clawdbot-moltbot-explained-a-complete-guide-to-the-autonomous-ai-agent.md|Milvus — OpenClaw Complete Guide]])) ===== Mitigation Strategies ===== * Enable sandboxing and restrict system-level access to only necessary functions * Audit all AgentSkills and ClawHub plugins before installation * Use strong authentication on the local gateway * Implement network isolation to prevent unauthorized outbound connections * Deploy prompt injection defenses and input validation * Run agents with the minimum viable model size (32B+ parameters recommended) * Monitor agent activity logs for anomalous behavior ===== See Also ===== * [[clawjacked_attack|What Is a Clawjacked Attack]] * [[saas_security_agents|SaaS Security Blind Spots from Third-Party Agents]] * [[hitl_governance|Human-in-the-Loop (HITL) Governance]] ===== References =====