If you're running OpenClaw, you probably got hacked in the last week (old.reddit.com)

176 points by kykeonaut 3 hours ago

steipete an hour ago

OpenClaw creator here.

This was a privilege-escalation bug, but not "any random Telegram/Discord message can instantly own every OpenClaw instance."

The root issue was an incomplete fix. The earlier advisory hardened the gateway RPC path for device approvals by passing the caller's scopes into the core approval check. But the `/pair approve` plugin command path still called the same approval function without `callerScopes`, and the core logic failed open when that parameter was missing.

So the strongest confirmed exploit path was: a client that ALREADY HAD GATEWAY ACCESS and enough permission to send commands could use `chat.send` with `/pair approve latest` to approve a pending device request asking for broader scopes, including `operator.admin`. In other words: a scope-ceiling bypass from pairing/write-level access to admin.

This was not primarily a Telegram-specific or message-provider-specific bug. The bug lived in the shared plugin command handler, so any already-authorized command sender that could reach `/pair approve` could hit it. For Telegram specifically, the default DM policy blocks unknown outsiders before command execution, so this was not "message the bot once and get admin." But an already-authorized Telegram sender could still reach the vulnerable path.

The practical risk for this was very low, especially if OpenClaw is used as single-user personal assistant. We're working hard to harden the codebase with folks from Nvidia, ByteDance, Tencent and OpenAI.

machinecontrol an hour ago

The root issue is that OpenClaw is 500K+ lines of vibe coded bloat that's impossible to reason about or understand.

Too much focus on shipping features, not enough attention to stability and security.

As the code base grows exponentially, so does the security vulnerability surface.

williamstein 41 minutes ago

The current OpenClaw GitHub repo [1] contains 2.1 million lines of code, according to cloc, with 1.6M being typescript. It also has almost 26K commits.

[1] https://github.com/openclaw/openclaw

earnesti 35 minutes ago

There are like 10 openclaw clones out there. If you prefer security over features, just pick up another one.

dyauspitr an hour ago

This is a vibe based comment. It’s a generic attack with no meat.

Retr0id an hour ago

pezo1919 an hour ago

rossjudson a few seconds ago

With respect...Security through obscurity is dead. We are approaching the point where only formally verified (for security) systems can be trusted. Every possible attack will be attempted. Every opening will be exploited, and every useful combination of those exploits will be done.

LLMs are patient, tireless, capable of rigorous opsec, and effectively infinite in number.

rob an hour ago

Is this you?

https://x.com/steipete/status/2005451576971043097

> Confession: I ship code I never read. Here's my 2025 workflow.

Might want to start reading it I'd say.

rdtsc 27 minutes ago

- "OpenClaw, read the code"

- "You're absolutely right. One should read and understand their own code. I did, and it looks great"

nightpool an hour ago

Can you speak a little bit more to the stats in the OP?

* 135k+ OpenClaw instances are publicly exposed * 63% of those run zero authentication. Meaning the "low privilege required" in the CVE = literally anyone on the internet can request pairing access and start the exploit chain

Is this accurate? This is definitely a very different picture then the one you paint

plestik an hour ago

There used to be a time where people who shipped CVEs took accountability.

inetknght an hour ago

> There used to be a time where people who shipped CVEs took accountability.

I see you haven't heard of Microsoft...

ua709 22 minutes ago

What time was that and who do we get to blame for Log4j?

lp0_on_fire an hour ago

Have you met these AI companies yet?

LucidLynx 9 minutes ago

About time to read the code you ship now...

popalchemist an hour ago

The level of seriousness of your attitude here is not commensurate to the blatant security problem you are creating in the world.

mvdtnz an hour ago

What does Telegram/Discord have to do with anything? The OP never mentioned either of these software suites. In fact the only mention of Telegram anywhere in the entire thread is you copy-pasting this exact message.

sunaookami an hour ago

Honest question: What do people actually USE OpenClaw for? The most common usage seems to be "it reads your emails!", that's the exact opposite of "exciting"...

sgillen an hour ago

I've only been playing with it recently ... I have mine scraping for SF city meetings that I can attend and public comment to advocate for more housing etc (https://github.com/sgillen/sf-civic-digest).

It also have mine automatically grabs a spot at my gym when spots are released because I always forget.

I'm just playing with it, it's been fun! It's all on a VM in the cloud and I assume it could get pwned at any time but the blast radius would be small.

gruez an hour ago

>It also have mine automatically grabs a spot at my gym when spots are released because I always forget.

seems far more efficient/reliable to get codex/claude code to write and set up a bot that does this.

mvdtnz an hour ago

Am I understanding right that you're leaving AI slop comments on public city meetings? Proudly doing so?

gruez an hour ago

earnesti an hour ago

I use it for a side project. I just put it on VPS, and then it edits the code and tests it. The nice thing is that I can use it on the go whenever I have spare moment. It is addictive, but way better addiction than social media IMO.

The thing where you give it access to all your personal data and whatever I haven't done and wouldn't do.

franze 41 minutes ago

my claw controls my old M2 mac, mostly my claw uses Claude code to code

dyauspitr an hour ago

Agent based chron jobs mostly that work with other agents. It’s really nice if you want to tell your computer to do something repeatedly or in confluence with many other agents in a very simple way. Like check my email for messages from Nadia and send me a notification and turn on all the lights in my driveway when she gets there without having to actually get into the nuts and bolts of implementing it. It’s actually really powerful and probably what Siri should be.

_doctor_love an hour ago

Assuming you're asking in good faith, IMHO the deeper story around OpenClaw is that it's the core piece of a larger pattern.

The way I'm seeing folks responsibly use OpenClaw is to install it as a well-regulated governor driving other agents and other tools. It is effectively the big brain orchestrating a larger system.

So for instance, you could have an OpenClaw jail where you-the-human talk to OpenClaw via some channel, and then that directs OpenClaw to put lower-level agents to work.

In some sense it's a bit like Dwarf Fortress or the old Dungeon Keeper game. You declare what you want to have happen and then the imps run off and do it.

[EDIT: I truly down understand sometimes why people downvote things. If you don't like what I'm saying, at least reply with some kind of argument.]

j-bos an hour ago

So I neither downvoted nor upvoted you, but I think people may be downvoting, in addition to the fact that they just don't like the thing, based on the fact that you didn't directly answer the question. Specifically, what are you using it for, not what hypothetically it would be used for.

PKop an hour ago

First words out of your mouth are to accuse OP of not seriously asking the question. Then you write paragraphs saying nothing much at all. You could have simply answered the question in a simple straightforward manner.

mvdtnz an hour ago

You're probably being downvoted because you didn't answer the question. The questioner specifically asked what people are using it for and you answered by describing your technical setup. What we want to know is, what are you actually achieving with this tool?

browningstreet an hour ago

This question gets asked a lot, and then answered a lot, and then asked again.. why fill the cup if the cup has a hole?

EDIT:

Y'all can downvote me if you want, but parent poster couldn't find clawhub.ai with 45K skills for OpenClaw.

Kinda belies the "No one uses OpenClaw for anything" line.

https://clawhub.ai/skills?sort=downloads&nonSuspicious=true

sunaookami an hour ago

Obviously I already searched the web (not specifically HN I must admit) and there were always incredibly generic non-answers that ultimately say nothing (and they assume you have 3000$ per month or 2000 Mac Minis on your desk (hyperbole)).

ziml77 an hour ago

emp17344 an hour ago

freedomben an hour ago

yeah I don't normally say "read previous HN articles" but it has been asked at least once in every article here.

emptysongglass 23 minutes ago

I'm so tired of answering this question so I simply won't.

Your best way of finding if it's useful for you is to install it and explore, just like you would with any other software tool.

DonHopkins a minute ago

[delayed]

petcat 2 hours ago

I don't use OpenClaw, but I still run my Claude Code and Codex as limited macOS user accounts and just have a script `become-agent <name> [cmd ...]` that does some sudo stuff to run as the limited user so they don't have any of my environment or directory access, or really any system-level admin access at all. They can use and write to their home directories as usual, which makes things easier to configure since those CLI harnesses really like when $HOME is configured and works as expected.

It's a good compromise between running as me and full sandbox-exec. Multi-user Unix-y systems were designed for this kind of stuff since decades ago.

w10-1 30 minutes ago

Yes, if/since that user have no access to your apple id and keychain...

Not too much harder is using a VM:

With Apple's open-source container tool, you can spin up a linux container vm in ~100ms. (No docker root)

With Apple virtualization framework, you can run macOS in a VM (with a separate apple id).

petcat 19 minutes ago

> Yes, if/since that user have no access to your apple id and keychain...

Right, these are system accounts. They don't have access to anything except their own home folder and whatever I put in their .bashrc. `sudo` is a pretty easy sandbox by itself and lets me manage their home folders, shell, and environment easily just with the typical Unix-isms. No need for mounting VM disks, persisting disk images, etc.

I don't need virtualization to let Claude Code run. I just let it run as a "claude" user.

niwtsol 2 hours ago

Title is a bit misleading, no? You have to have openclaw running on an open box. And the post even says "135k open instances" out of 500k running instances? so a bit clickbait-y

yonatan8070 4 minutes ago

This sounds like a classic case of "35% of statistics are made up"

0cf8612b2e1e 2 hours ago

1/5 rounds to “probably” when discussing security.

nickthegreek 2 hours ago

The 135k number appears to be pulled out of thin air? No idea where the 65% comes from. The command the post gives to list paired devices isn't correct. These are red flags.

mey 2 hours ago

More than 25% of users seems like a pretty accurate "probably".

DrewADesign an hour ago

You know you’re getting into zealot territory when people are arguing semantics over the headline pointing to a zero authentication admin access vulnerability CVE that affects a double-digit percentage of users.

earnesti an hour ago

peacebeard 2 hours ago

Today I learned nobody agrees on what the word "probably" means.

SequoiaHope 2 hours ago

zephen 2 hours ago

furyofantares 2 hours ago

Here's a statement that's about 3x as true then:

If you're running OpenClaw, you probably didn't get hacked in the last week.

earnesti 2 hours ago

The 135k instances is likely not true at all.

DrewADesign 2 hours ago

It’s also only 65% of those that have zero authentication configured, according to that post (which I have done nothing to confirm or challenge at all… Frankly I wouldn’t touch OpenClaw with a ten foot… cable?) That said, I think it’s far more important to get people’s attention who might otherwise not realize how closely they need to pay attention to CVEs than it is to avoid hyperbole in headlines.

codechicago277 2 hours ago

Not if this is crying wolf and causing those same people to ignore the very real security risks with using OpenClaw.

DrewADesign 2 hours ago

sva_ 2 hours ago

> 4. System grants admin because it never checks if you are authorized to grant admin

Shipping at the speed of inference for real.

reenorap 18 minutes ago

The threads on that /r/sysadmin post sound exactly like every sysadmin I've ever worked with in my career.

Leomuck 2 hours ago

Well, such things were to be expected. It's easy to bash on all the people who haven't gotten the necessary IT understanding of securing such things. Of course, it's uber-dumb to run an unprotected instance. But at the same time, it's also quite cool that so many people can do interesting IT stuff now. I'm thinking basically it's a trade-off. Be able to do great stuff, live with the consequences of doing that without proper training. Like repairing your car yourself. You might have fun doing it, it might get you somewhere, but you have to accept that if you have no idea about cars, you just introduced a pretty big risk into your life (say if you replaced the brakes or something). But yea, security, privacy, fighting climate change, all very much on the decline - humans doing cool things, ignoring important things - we'll have to live with the consequences.

paulhebert an hour ago

Gonna be honest. I'd rather fight climate change than have people run LLMs unsecured

Xunjin an hour ago

Yeah... The bill is already being paid. I wonder how the life quality of my nephew (and other children) of 5 years old today will be in the near future..

butlike 35 minutes ago

With your car example, you also assume the risk unto others. If your "chopper" of a car hits and kills someone else, and you survive, you're paying for the consequences of that. I don't think it's cool that untrained people can do interesting IT stuff now. I see it as a huge liability where some unsecured instance pwns the internet, then it's some 12 year old that gets marched in front of congress and everyone goes: "wtf?" There's essentially no accountability and the damage is still done.

neya 2 hours ago

Someone has to say this, but - If you still continued to use OpenClaw despite multiple top news sites explaining the scope of the previous hacks and why you shouldn't use it, you probably deserved to get hacked

pezo1919 39 minutes ago

“It’s OK to be hacked until everyone is getting hacked.”

n1tro_lab 26 minutes ago

Authorization failed open when a parameter was missing. Same pattern as Langflow. They patched one endpoint, missed another calling the same function. Per-endpoint hardening doesn't scale.

kube-system an hour ago

If someone could forward the SSH port from my VPS to access my instance, I already had bigger problems.

bigstrat2003 9 minutes ago

If you're running OpenClaw, you already threw security and reliability out the window by running LLMs on the command line. It's a bit late to start worrying now.

Simon321 2 hours ago

Only if your openclaw instance is publicly exposed on the internet... which is not the case for most people

causal 2 hours ago

Until recently, this was default configuration

Edit: Default binding was to 0.0.0.0, and if you were not aware of this and assumed your router was keeping you safe, you probably should not be using OpenClaw. In fact some services may still default to 0.0.0.0: https://github.com/openclaw/openclaw/issues/5263

https://github.com/openclaw/openclaw/commit/5643a934799dc523...

earnesti 2 hours ago

I have used openclaw pretty long but at no point it has proposed doing anything like that.

nickthegreek 2 hours ago

Not true. So many people love to come out of the woodwork on these openclaw posts who have no first hand knowledge of the software. It is stunning.

charcircuit 2 hours ago

Since pretty much the beginning it wasn't and the documentation explicitly warned not to make it public, exposing it to the internet. It included information on how you can properly forward the gateway port to your machine without opening it up to the internet.

rvz 2 hours ago

OpenClaw has over 400+ security issues and vulnerabilities. [0]

Why on earth would you install something like that has access to your entire machine, even if it is a separate one which has the potential to scan local networks?

Who is even making money out of OpenClaw other than the people attempting to host it? I see little use out of it other than a way to get yourself hacked by anyone.

[0] https://github.com/openclaw/openclaw/security

nickthegreek 2 hours ago

It does not need access to your full machine. It can literally run in a vps.

rob an hour ago

Most of the people using it probably don't even know what SSH is, let alone using a VPS to maintain a personal bot for them for years with no maintenance. They know Vercel and Supabase. They will run it on their local machine and just keep clicking yes to everything until they get the result they want.

fraywing 2 hours ago

How do you think the vibe-coding layman audience is using OpenClaw?

nickthegreek 2 hours ago

butlike 34 minutes ago

earnesti 2 hours ago

I don't think enabling admin on open internet is a default behaviour by any means?

pym4n an hour ago

Guys, OpenClaw is a toy, that's it!

throwatdem12311 2 hours ago

Think of all the people that are too ignorant to even understand the basics of any of this that are running OpenClaw. They will be completely unaware and attackers can easily hide their tracks by changing system prompts (among plenty of other things).

This is bad.

gos9 2 hours ago

Really? Posting AI generated Reddit post with no sources or anything?

hmokiguess 2 hours ago

The link mentions the CVE, here's the link https://nvd.nist.gov/vuln/detail/CVE-2026-33579

dijksterhuis an hour ago

if would be good if we could have the submission including this link at the top

tgv 2 hours ago

The CVE seems to be real.

fraywing 2 hours ago

Could anyone have predicted that giving an agent free reign of your personal hardware could have resulted in bad things happening? not I /s

jstanley 2 hours ago

But this is nothing to do with the agent being tricked. This is ordinary old-fashioned code being tricked!

paulhebert an hour ago

But was the code written by an agent? It's agents all the way down

podgorniy 2 hours ago

lol

tgv 2 hours ago

Your comment is obviously against the rules, but I read it as: Why are people not more careful? This is some unknown, app, with unknown, unvetted depths, and you only like it because other people say it's shiny and AI. It made you giddy, and you forgot that giving a tool permissions is an invitation to hackers. Well, you went ahead and ignored all common sense, and here we are.

deadbabe 2 hours ago

I have a theory OpenClaw was built deliberately for malicious reasons under the guise of being something cool and useful.

butlike 33 minutes ago

EA-3167 2 hours ago

In this case I'd say that it was made not to enable that, but in total disregard of its realistic uses and risks. In a sense this is less... deliberate poisoning, and more doing a bad job cutting heroin with fentanyl for distribution. Yeah the result is the same, but the cause is negligence to the point of parody rather than outright malice.

throwatdem12311 2 hours ago

Some people are so stupid it is indistinguishable from evil.

cactusplant7374 2 hours ago

What reason would Steinberger have for doing that? It was his hobby project.

throwatdem12311 2 hours ago

You can’t think of a single reason?

Intelligence asset.

Useful idiot.

Plenty of reasons.

asdff 2 hours ago

He doesn't need a reason. He could have been captured by intelligence after the fact.

blharr 2 hours ago

Hackernews is now posting links to reddit AI slop posts that I came here to get away from...

dgellow 2 hours ago

Flag then move to the next one

throwatdem12311 2 hours ago

As if the non-Reddit links aren’t majority AI slop already.