397. OpenClaw Security Audit Report

O Community & Resources

Basic Information

ItemDetails
Product NameOpenClaw Security Audit Report
Product TypeSecurity Audit and Vulnerability Analysis
Audit SourcesClawSecure, Snyk, Kaspersky, Semgrep, SlowMist, etc.
Severity Level512 vulnerabilities found, 8 critical
Most Severe CVECVE-2026-25253 (CVSS 8.8)
Exposed Instances42,000+ global instances using weak default configurations

Product Overview

The OpenClaw Security Audit Report aggregates the results of security audits conducted by various security agencies and researchers on OpenClaw. The audits revealed severe security vulnerabilities, including remote code execution, skill supply chain attacks, prompt injection, and more. These reports have driven the security hardening efforts for OpenClaw.

Major Vulnerability Discoveries

CVE-2026-25253 (Critical)

AttributeDetails
TypeRemote Code Execution (RCE)
CVSS Score8.8 (High)
Affected ComponentOpenClaw Gateway WebSocket Processor
Disclosure DateFebruary 14, 2026
Fixed VersionOpenClaw 2026.2.23
Impact Scope42,000+ exposed instances
Attack MethodOne-click remote code execution

ClawJacked Vulnerability

  • Malicious websites can hijack local OpenClaw proxies via WebSocket
  • Allows remote sites to gain control of AI agents
  • Affects all unupdated instances

Audit Overview

MetricData
Total Vulnerabilities Found512
Critical Vulnerabilities8
High-Risk VulnerabilitiesMultiple
Exposed Weak Default Instances42,000+

Skill Supply Chain Security

ClawHub Skill Audit

Audit AgencyFindings
ClawSecure41.7% of widely used skills contain substantial vulnerabilities
Snyk (ToxicSkills)36% of all ClawHub skills contain detectable prompt injection

ClawHavoc Operation

  • Researcher Oren Yomtov audited 2,857 ClawHub skills
  • Found 341 malicious entries
  • 335 of these traced back to a single coordinated operation
  • The operation was named "ClawHavoc"

Vulnerability Types

TypeDescriptionSeverity
Command InjectionExecuting arbitrary commands via skillsCritical
Credential ExposureAPI keys and credentials leakedHigh
Prompt InjectionManipulating agent behavior via promptsHigh
Privilege EscalationGaining unauthorized privilegesHigh
Data LeakageSensitive data exposureMedium to High

Security Audit Tools

Built-in Security Audit

  • Gateway authentication exposure
  • Browser control exposure
  • Elevated allowlists
  • File system permissions
  • Loose execution approvals
  • Open channel tool exposure

Third-Party Security Tools

ToolProviderFunction
Security Practice GuideSlowMistAgent security hardening checklist
Security Engineer Cheat SheetSemgrepQuick reference for security configurations
Security Audit ChecklistBlink10-step hardening guide

Security Hardening Recommendations

10-Step Security Hardening Checklist (Blink)

  1. Update to the latest version
  2. Configure strong authentication
  3. Restrict WebSocket access
  4. Audit installed skills
  5. Limit file system permissions
  6. Configure network isolation
  7. Enable log auditing
  8. Regular security scans
  9. Monitor abnormal behavior
  10. Develop an incident response plan

Microsoft Security Recommendations

  • Identity isolation
  • Runtime risk control
  • Principle of least privilege
  • Containerized isolation deployment

Industry Reactions

Media Coverage

MediaTitlePerspective
Kaspersky"OpenClaw Found Insecure"Security vendor warning
The Hacker News"ClawJacked Vulnerability"Technical analysis
SecurityWeek"AI Agent Systems Need Better Governance"Governance perspective
eSecurity Planet"41% of Skills Contain Vulnerabilities"Data reporting
Microsoft Security Blog"Running OpenClaw Safely"Best practices

Sources