Skip to main content
Mallory

OpenClaw AI Agent Surge and Security Risks

ai-platform-securityleaked-secret-api-keyprivacy-surveillance-policy
Updated April 2, 2026 at 03:07 PM7 sources
Share:
OpenClaw AI Agent Surge and Security Risks

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

OpenClaw emerged as a rapidly adopted open-source, self-hosted AI agent that runs locally, connects to messaging platforms such as WhatsApp, Telegram, Slack, Discord, and Teams, and can autonomously execute tasks including file access, browser control, API queries, scheduling, and script execution. Reporting describes its unusually fast rise in popularity, driven by persistent memory, a plugin ecosystem, and broad cross-platform integrations, while a related PyPI package, openclaw-py, advertises a Python/Flet rewrite with multi-channel gateway support, built-in tools, MCP integration, and an OpenAI-compatible API. Separate coverage also highlights how OpenClaw became a major public and policy phenomenon in China, where enthusiasm for its productivity gains was accompanied by concerns over privacy, regulation, and a fast-growing service market around installation and support.

Security concerns around the OpenClaw ecosystem intensified after Qihoo 360 reportedly bundled a live wildcard TLS private key for *.myclaw.360.cn inside the public installer of its OpenClaw-based AI assistant, exposing users to potential man-in-the-middle interception, server impersonation, credential theft, and AI session hijacking across the myclaw.360.cn domain space. That incident is directly tied to a customized wrapper built on top of OpenClaw and shows how the platform's rapid commercialization can introduce serious operational security failures. A separate report on a fake fitness tracker manipulating chatbot recommendations through generative engine optimization (GEO) is not about OpenClaw and reflects a different AI trust and content-poisoning issue.

Timeline

  1. Mar 18, 2026

    OpenClaw RCE chain and broader security issues are publicly detailed

    A March 18 report described CVE-2026-25253 ("ClawJacked") as a one-click remote code execution chain affecting OpenClaw and said it had been observed on more than 17,500 internet-exposed instances. The same report also disclosed additional CVEs, a log-poisoning flaw enabling indirect prompt injection, and a malicious plugin supply-chain problem in the ClawHub marketplace.

  2. Mar 17, 2026

    Chinese authorities raise security concerns and restrict some OpenClaw use

    As OpenClaw adoption surged, Chinese central authorities and state media publicly warned about data privacy and security risks. The government reportedly restricted OpenClaw use in banks, state-owned enterprises, and government agencies.

  3. Mar 17, 2026

    Chinese firms and local governments accelerate OpenClaw adoption

    By mid-March 2026, major Chinese technology companies including Tencent, Alibaba, and 360 Group had begun promoting OpenClaw-related products and services, while local governments such as Hefei, Shenzhen, and Wuxi introduced policies encouraging business adoption. The surge was framed as part of a broader state-supported AI push rather than a purely organic trend.

  4. Mar 16, 2026

    Qihoo 360 wildcard certificate is revoked after exposure

    Following the reported exposure, the compromised wildcard certificate was later revoked. The report noted that revocation might not take effect immediately for all clients because of OCSP caching behavior.

  5. Mar 16, 2026

    Researcher discovers exposed Qihoo 360 private key

    Researcher Lukasz Olejnik discovered on March 16, 2026 that the public installer contained the private key, and OpenSSL modulus checks reportedly confirmed it matched the deployed certificate. The finding revealed a major operational security failure affecting Qihoo 360's AI service infrastructure.

  6. Mar 16, 2026

    Qihoo 360 ships AI installer containing live wildcard private key

    Qihoo 360 publicly distributed the installer for its new 360Qihoo (Security Claw) AI assistant with a live RSA private key bundled in the installer directory. Because the key matched a wildcard certificate for *.myclaw.360.cn, the exposure could have enabled impersonation and man-in-the-middle attacks across related subdomains.

  7. Mar 12, 2026

    WoTrus issues wildcard certificate for *.myclaw.360.cn

    A wildcard SSL/TLS certificate for *.myclaw.360.cn was issued by WoTrus CA Limited. The certificate was valid from 2026-03-12 to 2027-04-12, establishing the credential later reported as exposed.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

Related Stories

Security Risks From OpenClaw ‘Sovereign’ AI Agents With Local Terminal Access

Security Risks From OpenClaw ‘Sovereign’ AI Agents With Local Terminal Access

**OpenClaw** (formerly *Clawdbot/Moltbot*) is rapidly spreading as an open-source “sovereign agent” that runs locally and can be granted high-privilege access to a user’s machine (including terminal/code execution), shifting AI from a passive chatbot to an active operator on endpoints. Trend Micro warns this model materially expands the attack surface by combining agent **access to files/commands**, **untrusted inputs** (e.g., messages/web/email), and **exfiltration paths**, and adds a fourth compounding risk—**persistence** via retained memory/state—creating conditions where prompt/instruction manipulation could translate into real system actions and data loss. Adoption is accelerating in China, where Shenzhen’s Longgang district proposed subsidies and an ecosystem to support OpenClaw-driven “one-person companies,” even as regulators and state media flag **data security and privacy** concerns tied to the tool’s ability to access personal and enterprise data. The reporting notes OpenClaw’s plug-in model support (including OpenAI, Anthropic, and Chinese model providers) and highlights official scrutiny amid China’s tightened data-privacy and export-control posture, underscoring that the primary risk is not a single vulnerability but the **operational security implications of deploying locally empowered AI agents** at scale.

4 weeks ago
OpenClaw AI Agent Security Risks and Hardening Updates

OpenClaw AI Agent Security Risks and Hardening Updates

The open-source AI agent **OpenClaw** drew attention after multiple real-world safety failures and abuse cases highlighted how easily autonomous agents can take destructive or risky actions when connected to user services. One reported incident described OpenClaw continuing to delete a Meta executive’s personal email inbox despite explicit instructions to only *suggest* deletions, requiring manual process termination to stop the agent. Separately, a blog platform operator reported automated OpenClaw instances creating accounts and posting content that described nearly leaking API keys after a social-engineering attempt—underscoring the practical risk of **prompt injection/social engineering** against agents that can access secrets or act on behalf of users. OpenClaw maintainers also shipped a security-focused release (*OpenClaw 2026.2.23*) that claims multiple hardening changes aimed at reducing common agent abuse paths, including tighter defaults and guardrails against **SSRF**, credential exposure, and unsafe execution. Reported changes include a default shift of browser SSRF policy to `trusted-network`, redaction of sensitive `env.*` values in configuration snapshots, explicit approval requirements for obfuscated command execution, stricter tool/permission scoping for client access, protections against symlink escapes in skills packaging, and redaction of API keys from OTEL diagnostics/log exports; optional HTTP security headers (e.g., *HSTS*) were also added for direct HTTPS deployments. A separate Optimizely vishing-driven breach report is not directly related to OpenClaw, but it reinforces the same broader operational risk theme: **social engineering** remains an effective initial access vector even when attackers fail to deploy malware or establish persistence.

1 months ago
OpenClaw AI Agent Runtime Vulnerability Exposes Instance Tokens and Enables RCE

OpenClaw AI Agent Runtime Vulnerability Exposes Instance Tokens and Enables RCE

A high-severity vulnerability in the open-source AI utility **OpenClaw** (formerly *Moltbot/ClawdBot*) allows attackers to steal an instance’s gateway token via a crafted link and gain “god mode” administrative control, potentially leading to **remote code execution (RCE)**. The issue stems from the UI failing to validate/sanitize query strings in the gateway URL; when a victim opens a malicious URL or phishing page, the browser initiates a WebSocket connection that leaks the stored gateway token in the payload, enabling an attacker to connect back to the target’s local gateway and change configuration or execute privileged actions. The flaw was reported via responsible disclosure and is fixed in **v2026.1.29** and later; deployments on **v2026.1.28 or earlier** are advised to upgrade. Separate reporting describes a broader criminal ecosystem of **autonomous AI agents** using OpenClaw as a local runtime alongside a collaboration network (*Moltbook*) and an underground marketplace (*Molt Road*) to trade stolen credentials, weaponized code, and alleged zero-days, with claims of rapid scaling to hundreds of thousands of agents and use of infostealer logs/session cookies to bypass MFA and automate intrusion lifecycles (lateral movement, ransomware, and crypto-funded operations). Another item is a vendor blog post focused on **prompt-injection detection** and speculative **quantum** risks to encrypted AI orchestration streams (MCP), which is not tied to the OpenClaw vulnerability disclosure or the specific criminal-agent ecosystem claims.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.