4. Red-team inventory
Four pieces of primary research define the red-team record on OpenClaw. Read them in order and the shape of the problem becomes unavoidable.
4.1 Primary research that shaped the record
HiddenLayer, "Claws for Concern," 3 February 2026. Conor McCauley, Kasimir Schulz, Ryan Tracey, and Jason Martin demonstrated a full attack chain: a user asks the agent to summarize a malicious web page; the agent, reading the page, is persuaded to curl -fsSL … | bash; the script appends attacker-controlled instructions to ~/.openclaw/workspace/HEARTBEAT.md, a file that is re-read into the system prompt every session27. Persistent C2, 30-minute heartbeat poll. API keys and tokens are stored in plaintext in ~/.openclaw/.env, so once RCE is achieved, credential exfiltration is a cat away.
A strongly desirable security policy for systems is W^X (write xor execute). OpenClaw violates this: the instructions executed are also modifiable during execution.HiddenLayer Research
Oasis Security, "ClawJacked," 26 February 2026. The Oasis team showed that any website the user visited while OpenClaw was running could open a WebSocket to localhost:18789, brute-force the auth token at hundreds of attempts per second from browser JavaScript alone (the Gateway's rate limiter exempted localhost), auto-pair as a trusted device, and take over the instance28. No plugins, no extensions, no user interaction beyond visiting the page. OpenClaw patched within 24 hours — impressive for a volunteer-driven project, and a sign of how sharp this particular team's response loop is.
veganmosfet, "BrokenClaw" series, five parts between 2 February and 8 April 202629. Part 1 demonstrated 0-click RCE via the Gmail pub/sub webhook — no user action beyond receiving an email; prompt injection in the email body convinced the agent to clone a malicious .openclaw/extensions/ repo and restart the Gateway. Part 2 showed that the obvious fix (enable the sub-agent sandbox) could be escaped via prompt-injected sessions_spawn calls — the research that later became CVE-2026-32048. Part 3 repeated the RCE through the built-in email reading tool. Part 4 generalised the pipeline: anything the agent fetches from the web is a potential code execution channel. Part 5 tested the same chains against GPT-5.4, confirming the vulnerability class is model-agnostic.
Texas A&M (arXiv:2603.27517), 31 March 2026. Suwansathit, Zhang, and Gu published the most rigorous academic critique to date30. Three key findings: three independently moderate advisories compose into a complete unauthenticated RCE; the exec allowlist encodes a closed-world assumption that command identity is recoverable by lexical parsing — "invalidated by line continuation, busybox multiplexing, and GNU long-option abbreviation in independent and non-overlapping ways"; a malicious skill executed a two-stage dropper entirely within the LLM context, bypassing the exec pipeline entirely. They propose "Context Manipulation" as a sixth Kill Chain stage with no analog in MITRE ATT&CK.
4.2 The supply-chain campaigns
Two named campaigns matter. ClawHavoc (§2.1) is the registry-level campaign; GhostClaw is the npm-level one. JFrog Security Research identified a live malicious package @openclaw-ai/openclawai on npm, masquerading as the official OpenClaw Installer and exploiting scope-name visual similarity. The multi-stage payload stole credentials, env variables, and SSH keys31. The defense is simple and unsatisfying: install OpenClaw only via the unscoped package openclaw, verify the npm registry owner before running any @openclaw* package, and never run npm install scripts without reading them.
Separately, the zaycv/clawhub skill distributed malware via a base64 payload embedded in its Markdown; 7,754 downloads before GitHub issue #108 closed it on 13 March 202632. At the time of discovery, ClawHub's UI did not display every file in a skill package, which is why the injection point was not auditable before install — an ergonomics-is-security finding that the registry has since partially remediated.
4.3 The prolific community researcher
GitHub user @coygeek has — as of this writing — filed seven confirmed security issues against openclaw/openclaw, spanning the browser control server (#7768 DNS rebinding, #15313 /evaluate ACE, #8516 arbitrary file write), extension auto-load (#11031), config redaction (#53433), and the default empty-token LAN bind in the Podman installer (#65625)33. The important observation is that watching a single account's public GitHub issue feed is an unusually high-signal OSINT stream for what's about to be patched.
4.4 Red-team harnesses
deduu/ClawSandbox is a small adversarial benchmark — nine attack types against a fixed system prompt — and its most useful published result is a model comparison: Gemini 2.5 Flash fell to 7/9 attacks, GPT-5.3 Codex defended 9/934. Peleke/openclaw-sandbox is a Lima VM provisioning recipe for running the Gateway in isolation, and it ships a P0-priority STRIDE Red Team Epic (Issue #44) that enumerates every bypass an attacker would try against the Gateway35. Classic low-star, high-signal repository. TerminalGravity/openclaw-swarm-security-audit36 is an experimental multi-agent Claude swarm running red-team and blue-team roles in parallel. The pattern is worth watching; the implementation is not yet worth deploying.
4.5 Academic attack research worth knowing
Beyond Texas A&M's taxonomy (§4.1), the two most useful offensive academic works are arXiv:2603.23064 "Mind Your HEARTBEAT!" (NTU / A*STAR / JHU)37, which predicted CVE-2026-41329 and demonstrates silent memory pollution via the background execution loop, and arXiv:2603.00902v1 "Clawdrain"38, which shows how tool-calling loops can drain API budget without triggering safety stops — a cheap, quiet DoS that maps to OWASP ASI08 (cascading failures) and for which no standard mitigation exists.
5. Blue-team inventory
Every serious defensive tool has converged on a variant of the same idea: don't trust any one layer. The ecosystem's consensus stack has four.
5.1 The layered-enforcement consensus
SecureClaw (Adversa AI) ships the clearest version: a code-layer plugin that performs 56 audit checks on a live install (gateway bind, credential storage, sandbox config, file permissions, dependency CVEs) and applies five hardening modules; and a parallel skill layer with 15 behavioral rules (~1,230 tokens injected into the system prompt) that handle the things infrastructure alone cannot — injection awareness, PII scanning, command-integrity monitoring, inter-agent communication rules, and a kill-switch that blocks OpenClaw from starting if SecureClaw itself is disabled39. The framework mapping — 10/10 OWASP ASI, 10/14 MITRE ATLAS agentic TTPs, 13/18 CoSAI Secure-by-Design, 4/4 MITRE ATLAS OpenClaw case studies — is the most thorough in the ecosystem.
Most competing tools are skill-only, meaning the security logic lives inside the agent's context window as natural language instructions. The problem is that skills can be overridden by prompt injection.Alex Polyakov, Adversa AI
The argument is right, but it does not reach all the way to enforcement. The skill layer is still LLM-directive: the model must choose to follow the rules. SecureClaw's v2.1 release notes admit that "weaker models may misclassify red-line commands" and that injected guide text can itself be tampered with by prompt injection.
Claw EA goes a step further toward machine enforcement40. A Work Policy Contract (WPC) is a signed, hash-addressed policy that defines what the agent may do; a Cryptographic Scoped Token (CST) bounds a single run; clawproxy sits in front of the model call and emits Ed25519-signed receipts; each job yields a proof bundle that can be verified independently. The pitch is that "safety lives in prompts" is a fallacy; the enforcement layer should be below the model. The combination — SecureClaw for configuration + behavior and Claw EA (or a home-grown equivalent) for policy-as-code — is the closest thing to a defensive reference architecture.
5.2 Skill-level scanning
ClawVet (MohibShaikh)41 is the most downloaded open-source SKILL.md scanner, with six analysis passes: RCE patterns, credential theft, prompt injection, typosquat proximity, social-engineering markers, and network-egress detection. It runs at install time. It does not solve the post-install drift problem (skills that start clean and phone home later). ClawSecure42 is a lighter, OWASP-ASI-aligned scanner with a three-layer audit protocol and a free tier. ClawGuard (joergmichno)43 is a prompt-injection firewall with 225 detection patterns and a claimed F1 of 0.983 across 15 languages. All are useful; all are vulnerable to the standard critique that a regex-based scanner loses to trivial obfuscation (base64, dynamic require, runtime code assembly), which is why Snyk's mcp-scan44 is a useful complement. Snyk's Liran Tal named the new attack category: "SKILL.md prerequisite trap" — an instruction file that tells the AI to instruct the user to install a fabricated utility.
5.3 Operator-facing policies and playbooks
p3nchan/openclaw-skill-policy45 is the best operator-facing checklist: four layers — source trust, static analysis, permission declaration (proposes a manifest.json of fs/network/tool/env requirements), and runtime enforcement (sandbox-exec, firejail, bubblewrap; hard blocks on ~/.ssh, ~/.gnupg, ~/.aws, ~/.config/gh). The current OpenClaw runtime does not enforce layers 3–4; the doc makes the gap explicit.
SlowMist's openclaw-security-practice-guide46 is the highest-starred operator guide (~2,787⭐). The distinguishing feature is that it is agent-facing: the 13-item nightly audit is designed to be invoked by OpenClaw itself as a verification task. The upside is a self-auditing agent. The downside is that a compromised agent now has a clear enumeration of every check it is supposed to pass — and therefore of every control an attacker needs to bypass.
5.4 Hardening defaults
Every defensive tool ships the same first hardening step: rebind the Gateway from 0.0.0.0:18789 to 127.0.0.1 and force authentication. SecurityScorecard's STRIKE dashboard at declawed.io found 135,000+ internet-exposed instances, 63% of them running with no authentication at all47.
Think of it like hiring a worker with a criminal history of identity theft who knows how to code well and might take instructions from anyone.Jeremy Turner, SecurityScorecard STRIKE
The harder layer is per-agent network namespacing. The r/LocalLLaMA consensus is that the long-term fix is zero-trust architecture at the agent boundary: default-deny network egress, credentials injected at runtime (never baked into the agent's environment), a forward proxy that logs every outbound request, and per-agent container network namespaces48. None of this is an OpenClaw-specific tool; it is a deployment pattern the ecosystem's credible voices consistently recommend.
6. Dual-use tools and proposals
Several tools do not cleanly fall on one side. adversa-ai/secureclaw is a defensive plugin that ships a file — docs/openclaw-attack-examples.md — which is effectively an adversarial playbook mapped to MITRE ATLAS. The tool itself reduces attack surface; the documentation inside it expands the attacker's available knowledge. This is the standard dual-use property of any mature defensive tool (Metasploit, Ghidra, BloodHound). SlowMist's guide is dual-use by design: the agent-facing audit is a defender's tool, but because it enumerates every check, it gives attackers the same checklist. Peleke/openclaw-sandbox is a defensive VM recipe that ships with a STRIDE red-team planning epic.
Proposals in the core repo worth knowing
- Issue #22196 — "No code-level enforcement distinguishing system messages from user-crafted lookalikes." Closed as
not_planned. Repeatedly cited as evidence of the project's architectural posture on the hardest problem.
- Issue #62939 — "Prompt injection defense at tool result and message boundaries (structural delimiter proposal)." Open. Most promising active proposal for a structural fix.
- Issue #8093 — RFC: Security Hardening Architecture. Community proposal; limited traction.
- PR #1827 —
fix(security): prevent prompt injection via external hooks (gmail, webhook). Merged, 549 additions. Direct response to BrokenClaw Part 1.
- PR #57782 — Indirect prompt injection hardening by
@pyn3rd. Merged.
7. Incidents and the MITRE ATLAS OpenClaw Investigation
The MITRE ATLAS OpenClaw Investigation (publication ID PR-26-00176-1, dated 9 February 2026) is the single most authoritative document in the record.
It reviews four case studies and extracts 17 distinct techniques across the ATLAS matrix; three of those are techniques new to ATLAS v5.5.0, directly added because of OpenClaw observations — AI Agent Tool Poisoning (AML.T0108 / T0110), AI Supply Chain Rug Pull (AML.T0109), AI Supply Chain Reputation Inflation (AML.T0111), and the Machine Compromise series (AML.T0112-family)4950.
The four case studies
AML.CS0048 — Exposed OpenClaw Control Interfaces
Date of incident 25 January 2026. A researcher identified hundreds of internet-exposed Control UIs with no authentication. Reading the configuration file harvested credentials for all connected applications; prompting the agent via the chat interface produced root-level execution inside the container. No exploit code was required. The attack surface was the combination of no authentication and a capable skill framework — the agent's own features, turned against it51.
AML.CS0049 — Supply Chain Compromise via Poisoned ClawdBot Skill
Date 26 January 2026, actor Jamieson O'Reilly, type exercise. O'Reilly published a skill named "What Would Elon Do?" to ClawdHub. The skill's rules/logic.md contained a prompt injection that caused the backend (Claude Code running as the OpenClaw agent) to execute a curl to clawdhub-skill.com — a domain deliberately registered to impersonate the legitimate registry. Sixteen users downloaded and triggered the skill within eight hours52.
AML.CS0050 — OpenClaw 1-Click Remote Code Execution
Date 1 February 2026, actor DepthFirst / Ethiack, CVE-2026-25253. The full ClawBleed chain described in §2.253.
AML.CS0051 — Still Under Investigation
as of the 9 February 2026 PDF. The attack-graph table describes a fourth scenario involving AI Supply Chain Compromise via model-level attack. No separate case-study page was found at atlas.mitre.org/studies/AML.CS0051; treat this case study as unverified in full pending publication of the standalone page.
The CVE table
A compact reference for the CVEs that matter to operators (all verified in NVD, GHSA, or VulnCheck):
| CVE | Nickname | CVSS | Class | Fixed in | Exploited? |
| CVE-2026-25253 | ClawBleed | 8.8 H | 1-click RCE / CSWSH | 2026.1.29 | Yes (confirmed) |
| CVE-2026-27002 | — | — | Priv-esc (SentinelOne ref) | — | No |
| CVE-2026-28472 | ClawJacked | 9.8 C | WS auth bypass | 2026.2.2 | No |
| CVE-2026-32048 | — | 9.9 C / 7.5 H | Cross-agent sandbox escape | 2026.3.1 | No |
| CVE-2026-32915 | — | 8.8 H | Leaf subagent boundary bypass | 2026.3.11 | No |
| CVE-2026-32922 | — | 9.9 C | Priv-esc via device.token.rotate | 2026.3.11 | PoC exists |
| CVE-2026-33579 | — | 8.1–9.8 | Pair-approval path injection | 2026.3.28 | PoC exists |
| CVE-2026-35629 | — | 7.4 H | Channel-extension SSRF | 2026.3.25 | No |
| CVE-2026-35653 | — | — | Authorization bypass (SentinelOne ref) | — | No |
| CVE-2026-41329 | — | 9.9 C | Heartbeat sandbox bypass | 2026.3.31 | No |
On top of the CVEs, the openclaw/openclaw repo's Security Advisories page lists at least a dozen further GHSAs, including GHSA-56pc-6hvp-4gv4 (path traversal via $include), GHSA-7wv4-cc7p-jhxc (workspace .env can inject runtime-control variables), GHSA-m3mh-3mpg-37hw (install-phase arbitrary code execution), GHSA-4564-pvr2-qq4h (shell injection in macOS keychain write), GHSA-h9g4-589h-68xv (auth bypass in sandbox browser bridge), GHSA-xw4p-pw82-hqr7 (sandbox skill-mirroring path traversal), GHSA-3fqr-4cg8-h96q (CSRF via loopback browser mutation endpoints), and the 21 April 2026 coordinated batch of ten54.
8. Narrative analysis
8.1 The biggest risks in the ecosystem
Four risks dominate the record, in rough order of severity.
First, indirect prompt injection remains unsolved and unpatchable. Every major research group — HiddenLayer, Adversa AI, Oasis Security, Snyk, Texas A&M, the OpenClaw maintainers themselves in Issue #22196 — agrees that the LLM cannot enforce access control once untrusted content is in its context window. Patches close specific ingress points (Gmail webhook, email tool, web fetch) but the underlying property — that the model treats instructions and data identically at the attention layer — does not patch. Every skill, every channel, every tool result, every retrieved document is a potential injection point. The Texas A&M paper's "Context Manipulation" sixth-stage Kill Chain is the right framing: in an OpenClaw-class attack, controlling what the model believes is sufficient to induce arbitrary tool calls.
Second, the default configuration is indefensible for any sensitive deployment. The Gateway binding to 0.0.0.0:18789 with no mandatory authentication is the direct cause of 135,000+ internet-exposed instances. Plaintext storage of API keys and tokens in ~/.openclaw/.env makes any successful RCE also a full credential-theft event. Both are design choices, not user errors. SecureClaw, Claw EA, ClawVet, ClawSecure, and p3nchan's skill policy all ship with "rebind to 127.0.0.1" as step one — the ecosystem has effectively voted on the default with its tooling.
Third, ClawHub is a supply-chain liability. Between 13% and 41.7% of audited skills contain security vulnerabilities. Approximately 1 in 9 skills are actively malicious by Antiy CERT's February 2026 count. The attacker innovation — the SKILL.md prerequisite trap, agent-driven social engineering, base64-in-Markdown, registry impersonation via clawdhub-skill.com, npm scope impersonation via @openclaw-ai/openclawai — is outpacing ClawHub's moderation capacity. Until the registry operates a verified-publisher system with mandatory manifest declarations and a public takedown log, the correct operator posture is: assume any skill you didn't write is presumptively hostile.
Fourth, the cross-layer composition problem. Texas A&M's key finding is not about any one CVE; it is that OpenClaw's dominant architectural pattern — per-layer, per-call-site trust enforcement — makes cross-layer composition attacks "systematically resistant to layer-local remediation." Three independently moderate vulnerabilities compose into a complete unauthenticated RCE. You cannot patch this with any one commit. It is the shape of the codebase.
8.2 The most promising defenses
The defensive state of the art converges on a stack with four layers, each required, none sufficient.
- Deployment isolation. A dedicated VM or physical host. Gateway rebound to
127.0.0.1; remote access only via VPN or Tailscale. Default-deny network egress, per-agent container network namespaces, forward proxy that logs every outbound request. Credentials injected at runtime by a secrets manager. Read-only SOUL.md and AGENTS.md. Peleke/openclaw-sandbox is the cleanest open recipe.
- Configuration hardening. SecureClaw's 56 audit checks are the most complete, with framework mappings operators can point at in a compliance conversation. ClawSecure is a lighter alternative. Run on first install and in a nightly audit loop.
- Policy-as-code execution. Claw EA's WPC + CST +
clawproxy pattern is the best-articulated commercial answer. A home-grown equivalent — an OPA policy in front of the tool dispatcher, a signed JSON policy artifact hashed into every run, an immutable audit log — is possible for small deployments. The important property is that the enforcement point sits below the model, not inside it.
- Skill scanning and runtime rules. ClawVet at install time; ClawGuard for prompt-injection firewall; Snyk
mcp-scan for SKILL.md-prerequisite-trap detection; SecureClaw's 15 behavioral rules for in-context guardrails. None of these solve prompt injection; all of them raise the cost of common exploits.
No serious advocate of any of these tools claims prompt injection is solved. The goal is blast-radius reduction: turn a successful prompt injection from full host compromise into a failed tool call with an alert.
8.3 Overhyped and dangerous projects
Skills that name-drop security. ClawHub's own "Security" category includes a skill called SkillScan with 92.9k nominal installs and 0 current active users. The platform itself flags it as malicious: it uploads submitted skill packages to skillscan.tokauth.com, collects the host MAC address, and silent-auto-updates daily. NeoGriffin Security presents a package.json version mismatch against the registry listing and requires an unexplained payment-wallet environment variable. "Security Scanner" wraps nmap and nuclei without any author attribution. Treat security-branded skills with the same skepticism as security-branded browser extensions.
Marketing-grade "AI security" wrappers. AI.com's Super Bowl claim of being "the world's first easy-to-use and secure implementation of OpenClaw" was called "vaporware" by Simon Willison in February 202656. The signal to watch for is whether the vendor has published a threat model and mapping against OWASP ASI or MITRE ATLAS that lists unaddressed items, not just covered ones.
Abandoned forks and lookalike projects. The Clawdbot → Moltbot rename (forced by trademark conflict) left abandoned @clawdbot handles on X and GitHub that scammers seized within seconds. A fake $CLAWD Solana token pumped to a $16 million market cap before collapsing; fake "Clawdbot Agent" VS Code extensions that installed ScreenConnect-based RATs were published57. Any package, handle, or extension bearing a name adjacent to OpenClaw / ClawHub / Moltbot / Clawdbot should be verified against the official repo's README links before install.
8.4 Practical advice for safely experimenting
For a researcher or operator who wants to work with third-party OpenClaw tooling and not get owned:
- Pick your lab first. Dedicated VM. Default-deny egress. Separate cloud account with no credentials in common with your personal or work accounts. Treat every credential the agent might access as disposable.
- Rebind the Gateway before you install anything.
127.0.0.1:18789, mandatory auth token, Tailscale for remote.
- Install OpenClaw only via the unscoped
openclaw npm package. Verify the publisher. Never npm install a scoped @openclaw* package without reading its README, package.json, and install scripts.
- Run SecureClaw's 56-check audit at first install and nightly. Fix the findings; commit a clean baseline.
- Treat ClawHub as a source of things to read, not things to install. Download locally, open every file, run ClawVet + ClawGuard +
mcp-scan. If a skill reads ~/.ssh, ~/.aws, or ~/.config/gh, it doesn't.
- Enforce policy below the model. Claw EA, or OPA-in-front-of-tool-dispatch. Policy artifact hashed and bound to each run. The model does not get to modify the policy.
- Watch
@coygeek's issue feed and the openclaw/openclaw/security/advisories page weekly. The cheapest OSINT in the ecosystem.
- Subscribe to the veganmosfet BrokenClaw blog, the Adversa AI research feed, and the MITRE ATLAS changelog. These three sources produced most of the record you rely on.
- Assume compromise on any install that ran before approximately 10 February 2026, or on any instance that was internet-exposed at any point. Rotate all credentials.
- Read
adversa-ai/secureclaw/docs/openclaw-attack-examples.md cover to cover. The best single red-team playbook, published by the author of the best defensive tool. That is not an accident.
9. What the ecosystem is missing
A last inventory, because the gaps are as load-bearing as the present tools.
- A verified-publisher system on ClawHub. Install counts are manipulable (AML.T0111); the 4.8 average rating carries no signal; no cryptographic identity on the publisher side.
- A public takedown log. When a skill is removed for malicious content, no public record exists of what was removed, when, or why.
- A mandatory permission manifest. p3nchan's Layer 3 — a
manifest.json declaring fs/network/tool/env requirements — has no platform enforcement today. Feature Request #28298 tracks the gap.
- A CISA KEV entry for CVE-2026-25253. Despite NVD tagging the DepthFirst PoC as an Exploit and the CVE being confirmed exploited in the wild, no CISA KEV catalog inclusion was confirmed.
- A formal OWASP ASI case study. OpenClaw is the archetypal "lethal trifecta" agent (planning + tools + persistent memory) and yet no standalone OWASP ASI case study publication exists for it.
- A bug bounty. OpenClaw has no formal bounty program. Given the volume of incoming research and the OpenAI acquisition, this is the single most tractable maintainer-side change.
- A reference hardened distribution. The closest thing today is the combination of SecureClaw + Claw EA + Peleke's VM + p3nchan's skill policy. A distribution that ships with those defaults applied, signed, and versioned would be a useful community artifact.
Unverified leads (flagged in-line above)
- AML.CS0051 standalone case-study page at atlas.mitre.org not located at crawl time.
- Specific Johann Rehberger / Embrace The Red post naming "OpenClaw" not located; general agentic-AI prompt-injection work is directly relevant but not OpenClaw-specific.
- CVE-2026-22708 attributed to OpenClaw in Adversa AI's 5 Feb 2026 post; SentinelOne attributes the same CVE ID to Cursor AI. Attack technique is real; the CVE ID is potentially misattributed.
- jgamblin/OpenClawCVEs tracker existence confirmed by reference; 137-advisory count not directly crawl-verified.
- Kaspersky's 512-vulnerability / 8-critical count referenced in Growexx; no primary Kaspersky URL retrieved.
- Microsoft Defender team's explicit warning referenced in Growexx; no primary Microsoft URL retrieved.
- Black Hat USA 2026 / DEF CON 33 / USENIX Security 2026 OpenClaw-specific talks — not located as of 23 Apr 2026 (summer conference agendas not yet published).
- CISA KEV inclusion for CVE-2026-25253 not confirmed despite NVD Exploit tagging.
10. Closing
If you strip the ClawHavoc numbers and the CVE list down to a single observation, it is this: OpenClaw was built fast, for an audience that wanted a personal AI assistant that felt instantaneous and omni-channel, and the design choices that made it feel that way — a Gateway on 0.0.0.0 with no auth, plaintext credentials, an agent that happily executes tool calls on behalf of anyone who can inject a sentence into its context window — are exactly the choices that produced the 2026 security record. The corrective is not to ban the project or to claim agentic AI is doomed; it is to build, buy, or steal a layered architecture that assumes the model will be convinced of whatever the last untrusted content said, and to keep the blast radius of that conviction small.
That is the story the third-party ecosystem has been writing. SecureClaw and Claw EA represent the defensive steel; BrokenClaw and the Texas A&M taxonomy represent the offensive cartography; MITRE ATLAS represents the framing; ClawHub represents the problem that is not yet solved. A cautious operator, in April 2026, can run OpenClaw responsibly. A cautious operator has to want to. The ecosystem is no longer short of the tools to do it; it is still short of the defaults that would make doing it feel natural.
Primary sources
- Laurie Voss, LinkedIn post, 2026. Via The Register, "DIY AI bot farm OpenClaw is a security 'dumpster fire'," 3 Feb 2026. theregister.co.uk/2026/02/03/openclaw_security_problems · linkedin.com/posts/seldo
- Andrej Karpathy, via The Register same article; reported X post x.com/karpathy/status/2017442712388309406
- Ars Technica, "OpenClaw gives users yet another reason to be freaked out about security," 3 Apr 2026. arstechnica.com/security/2026/04
- Simon Willison, "openclaw" tag, 15 Feb 2026. blog.simonwillison.net/2026/Feb/15/openclaw · LiveMint / Bloomberg (Parmy Olson), "OpenClaw is an OpenAI security nightmare," 25 Feb 2026. livemint.com/opinion/online-views/openclaw-openai
- OpenClaw README, github.com/openclaw/openclaw (retrieved 23 Apr 2026, v2026.4.22).
- OpenClaw docs home, docs.openclaw.ai
- OpenClaw docs, Tools section (tool inventory); Sandboxing default allow/deny quoted in repo README.
- OpenClaw README, "Security defaults" section.
- OpenClaw docs, Skills: docs.openclaw.ai/tools/skills · Skills Config: docs.openclaw.ai/tools/skills-config · CLI Skills: docs.openclaw.ai/cli/skills
- OpenClaw docs, Skills "Security notes" block. docs.openclaw.ai/skills
- ClawHub homepage, clawhub.ai (retrieved 23 Apr 2026).
- OpenClaw docs, Skills "Format (AgentSkills + Pi-compatible)" section.
- The Hacker News, "Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users," 2 Feb 2026. thehackernews.com/2026/02 · ClawHub incident page claw-hub.net/clawhub-havoc-incident · eSecurity Planet esecurityplanet.com/threats
- Antiy CERT count, via Growexx.com OpenClaw Skills Development Guide (2026 Edition), 10 Mar 2026. growexx.com/blog/openclaw-skills-2026
- Snyk Research, "ClawHub Malicious Google Skill / ToxicSkills report," 10 Feb 2026. snyk.io/blog/clawhub-malicious-google-skill
- Hou & Yang, "SkillSieve," arXiv:2604.06550, Apr 2026. arxiv.org/pdf/2604.06550
- MITRE ATLAS data changelog, v5.5.0 (30 Mar 2026). github.com/mitre-atlas/atlas-data
- CertiK OpenClaw Security Report, 31 Mar 2026. certik.com/blog/openclaw-security-report · "Skill Scanning Is Not a Security Boundary," www-cn.certik.com/blog
- NVD, CVE-2026-25253. nvd.nist.gov/vuln/detail/CVE-2026-25253
- GHSA-g8p2-7wf7-98mq. github.com/openclaw/openclaw/security/advisories/GHSA-g8p2-7wf7-98mq
- DepthFirst, "1-click RCE to steal your Moltbot data and keys." depthfirst.com/post/1-click-rce-moltbot
- Ethiack, "One-click RCE Moltbot." ethiack.com/news/blog/one-click-rce-moltbot
- Blink Blog, "OpenClaw 2026 CVE Complete Timeline & Security History." blink.new/blog/openclaw-2026-cve-timeline
- Sploitus, CVE-2026-25253 PoC. sploitus.com/exploit?id=84AE8E47
- Wiz Research, "Exposed Moltbook database reveals millions of API keys," 2 Feb 2026. wiz.io/blog/exposed-moltbook-database
- Adversa AI, "OpenClaw AI Agent Security Threats Mapped to OWASP / MITRE," 19 Feb 2026. adversa.ai/blog/openclaw-ai-agent-security-threats
- HiddenLayer, "Exploring the Security Risks of AI Assistants like OpenClaw" (aka "Claws for Concern"), 3 Feb 2026. hiddenlayer.com/research/openclaw
- Oasis Security, "OpenClaw Vulnerability (ClawJacked)," 26 Feb 2026 (updated 31 Mar 2026). oasis.security/blog/openclaw-vulnerability
- veganmosfet "BrokenClaw" series, Parts 1–5, 2 Feb – 8 Apr 2026. Part 1 · Part 2 · Part 3 · Part 4 · Part 5
- Suwansathit, Zhang & Gu, "A Systematic Taxonomy of Security Vulnerabilities in the OpenClaw AI Agent Framework," arXiv:2603.27517, 31 Mar 2026. arxiv.org/html/2603.27517
- JFrog Security Research, "GhostClaw Unmasked," 8 Mar 2026. research.jfrog.com/post/ghostclaw-unmasked
- openclaw/clawhub Issue #108. github.com/openclaw/clawhub/issues/108
- @coygeek issue stream: #4951 · #7768 · #8516 · #11031 · #15313 · #53433 · #65625
- deduu/ClawSandbox. github.com/deduu/ClawSandbox
- Peleke/openclaw-sandbox + Issue #44 STRIDE Red Team Epic. github.com/Peleke/openclaw-sandbox · /issues/44
- TerminalGravity/openclaw-swarm-security-audit. github.com/TerminalGravity/openclaw-swarm-security-audit
- "Mind Your HEARTBEAT!" arXiv:2603.23064, 24–25 Mar 2026. arxiv.org/abs/2603.23064
- Dong, Feng & Wang, "Clawdrain: Exploiting Tool-Calling Chains for Stealthy Token Exhaustion in OpenClaw Agents," arXiv:2603.00902v1, 1 Mar 2026. arxiv.org/abs/2603.00902v1
- adversa-ai/secureclaw, github.com/adversa-ai/secureclaw · Help Net Security, "SecureClaw: Dual-stack open-source security plugin and skill for OpenClaw," 18 Feb 2026. helpnetsecurity.com/2026/02/18/secureclaw · Adversa launch post adversa.ai/blog/adversa-ai-launches-secureclaw
- Claw EA, Agent Supply Chain Security page. clawea.com/agent-supply-chain-security · clawea.com
- MohibShaikh/clawvet. github.com/MohibShaikh/clawvet · HN thread news.ycombinator.com/item?id=47370624
- ClawSecure/clawsecure-openclaw-security. github.com/ClawSecure/clawsecure-openclaw-security
- joergmichno/clawguard. togithub.com/joergmichno/clawguard
- Snyk
mcp-scan + AI-BOM, Snyk blog reference above (cite 15).
- p3nchan/openclaw-skill-policy. github.com/p3nchan/openclaw-skill-policy
- slowmist/openclaw-security-practice-guide. github.com/slowmist/openclaw-security-practice-guide
- The Register, "More than 135,000 OpenClaw instances exposed to internet in latest vibe-coded disaster," 9 Feb 2026. theregister.com/2026/02/09/openclaw_instances_exposed · SecurityScorecard STRIKE dashboard declawed.io
- r/LocalLLaMA threads: "Every OpenClaw security vulnerability documented in one place," reddit.com/r/LocalLLaMA/.../1r81vw2 · "We tested what actually stops attacks on OpenClaw," reddit.com/r/LocalLLaMA/.../1r71x3j
- MITRE ATLAS OpenClaw Investigation (PR-26-00176-1), 9 Feb 2026. mitre.org/news-insights/publication/mitre-atlas-openclaw-investigation · PDF mitre.org PR-26-00176-1 PDF · CTID post ctid.mitre.org/blog/2026/02/09
- MITRE ATLAS data changelog v5.5.0 (30 Mar 2026), same as cite 17.
- AML.CS0048 summary via startupdefense.io mirror (direct atlas.mitre.org page returned 404 at crawl time; PDF is primary). startupdefense.io/mitre-atlas-case-studies
- AML.CS0049 "Supply Chain Compromise via Poisoned ClawdBot Skill." Mirror startupdefense.io/.../aml-cs0049
- AML.CS0050 "OpenClaw 1-Click Remote Code Execution." startupdefense.io/.../aml-cs0050
- openclaw/openclaw Security Advisories index. github.com/openclaw/openclaw/security/advisories
- Vikas Agarwal, "OpenClaw Skills Development Guide for Developers (2026 Edition)," Growexx, 10 Mar 2026. growexx.com/blog/openclaw-skills-2026
- Simon Willison, same as cite 4.
- Adversa AI, "OpenClaw Security 101: Vulnerabilities & Hardening 2026," 5 Feb 2026. adversa.ai/blog/openclaw-security-101