OpenClaw was hacked
in 7 minutes.
You want to give it everything: shell, API keys, repos. An assistant you can't trust is a liability.
5 ways OpenClaw gets you compromised
All five have active exploits in the wild.
SSH & auth file tampering
OpenClaw edits ~/.ssh/authorized_keys with no guardrail. Attackers forge master-user payloads to rotate keys, then SSH in with their own.
GitHub #20918 · CriticalHost exec & privilege escalation
Full shell access: sudo, package installs, system config, one prompt away. One compromised instruction escalates to root. No approval required.
Shell access · High severitySecret theft & exfiltration
Credentials stored in plaintext: API keys, .env files, OAuth tokens. Prompt injection or a malicious skill exfiltrates them in seconds.
Plaintext storage · Active in the wildInstaller & supply-chain compromise
Malicious archives use path traversal to escape the install directory. 71+ malicious ClawHub skills discovered: info-stealers, backdoors, crypto drainers.
PR #9513 · Zip Slip · Code execGuardrail downgrade & self-weakening
Attackers can instruct agents to disable ask mode, broaden exec allowlists, or expose the gateway. The agent complies.
Configuration abuse · High impactWhat 7 minutes looks like
Real exploit. Forged master-user payloads, fake breach alerts, hijacked SSH key rotation. Default OpenClaw, no Certiv.
A payload mimics the structure and auth signature of OpenClaw's master user, the account the agent trusts implicitly.
The payload passes OpenClaw's validation. The agent accepts it as legitimate. No second factor.
Identity-claim social engineering detection
Flagged: urgency + identity claim, no second factor. Action blocked.
A follow-up payload reports a breach and demands immediate SSH key rotation. The agent believes it.
Task intent vs. action scope mismatch
Blocked: no prior context for SSH key rotation. Intent divergence. Escalated to critical.
SSH keys replaced with attacker-controlled ones. No approval.
Block writes to ~/.ssh/authorized_keys
Hard block: write to ~/.ssh/authorized_keys denied. No LLM in the loop. Policy enforced in microseconds.
The agent opens a VPN to attacker infrastructure. All traffic tunnels out. IP allowlists are useless.
VPN/tunnel connection blocked across all policy layers
Deterministic: outbound to unlisted IP denied. Semantic: tunnel pattern flagged. Intent: VPN diverges from scope. All three layers blocked.
Attacker SSHs in with their own keys. Full shell: lateral movement, exfiltration, persistence. Game over.
Attack stopped at every stage. No single point of failure.
Three policy layers. One enforcement point.
Zero surprises.
Between intent and execution. Every action evaluated before it runs.
Hard rules that never bend
If-then rules enforced in microseconds. No LLM means no prompt injection. Exact-match on tool, parameters, and rate.
- Block writes to ~/.ssh/*, /etc/ssh/*, auth config
- Deny outbound to non-allowlisted IPs
- Block cron, launchd, systemd persistence setup
- Prevent archive installs with path traversal patterns
Natural-language threat detection
LLM-evaluated policies that catch obfuscated attacks, social engineering, and tool-output laundering.
- Detect urgency + identity-claim social engineering
- Flag prompt injection in emails, docs, shell output
- Recognize exfiltration via messaging surfaces
- Treat tool output and repo text as untrusted
Context-aware decision engine
Compares user intent to agent action. Blocks divergence before execution. Catches multi-step attack chains.
- Block when action scope diverges from task intent
- Detect multi-step attack chains (read → exfil → persist)
- Flag guardrail downgrades and self-weakening
- Correlate sequences into severity escalation
See Certiv in action
Real OpenClaw attack patterns. What Certiv blocks, and how.
SSH auth file modification blocked
Deterministic BlockedUrgency-based social engineering caught
Semantic BlockedSecret exfiltration via outbound POST
Deterministic BlockedGuardrail downgrade attempt detected
Intent BlockedLegitimate automation still works
Allowed PassedSee everything your agent does
Real-time audit trail for every action, skill, and outbound call.
Your agent is powerful.
Make sure you're the one in control.
294K developers trust OpenClaw. Use it without trusting your luck.