Last updated: 5 March 2026
Short answer: OpenClaw is safe when the gateway
is private, authentication is enforced, and your version is
patched to at least 2026.2.26. The highest risk in
2026 remains exposed public instances running stale versions
with weak or missing auth.
We run SureClaw deployments across Australia, and the same failure pattern repeats: public gateway exposure, firewall assumptions that break in Docker, or rushed token setup. This guide covers the exact checks we use in production.
Why 2026 made OpenClaw security urgent
OpenClaw growth from roughly 1,000 publicly exposed instances to over 21,000 in a single week at the end of January 2026 dramatically increased the attack surface. Independent security reporting also found more than 42,000 exposed instances, with a large subset actively vulnerable and many showing authentication bypass conditions.
The critical vulnerability CVE-2026-25253 (CVSS
8.8) enabled one-click remote code execution via a malicious
link. It was patched in OpenClaw 2026.1.29, and the
later ClawJacked issue required patching to
2026.2.25 or later.
Cisco, Palo Alto Networks, and CrowdStrike all published warnings in 2026, highlighting the risk profile of exposed OpenClaw environments with broad tool access.
How exposed is OpenClaw right now?
Multiple scanning teams documented exposure at scale. Censys reported 21,639 exposed instances as of 31 January 2026, and Bitsight observed more than 30,000 in its wider analysis window.
On the skills side, Snyk found that 36.82% of community skills had at least one security flaw. Other researchers identified hundreds of malicious skills in ClawHub, including credential theft and data exfiltration payloads.
For Australian businesses, these global numbers translate directly: if your gateway is open on a public IP with default settings, you are in the highest-risk category.
Security hardening checklist
Run these ten checks first. If any fail, treat the setup as non-production.
-
Upgrade OpenClaw to at least version
2026.2.26. -
Bind gateway to
127.0.0.1only, never0.0.0.0. -
Require and validate auth tokens for every gateway request
(generate with
openssl rand -hex 32). - Put a reverse proxy in front of OpenClaw with HTTPS, rate limiting, and request size caps.
-
Block port
18789at both cloud firewall and host firewall layers. - Disable password SSH and enforce key-only host access.
-
Patch the base OS weekly and pin Docker image tags (do not
use
:latestin production). - Store API keys outside writable app directories.
- Review enabled skills and remove non-essential tool access.
- Alert on repeated auth failures and unusual gateway request spikes.
The Docker + UFW firewall footgun
One of the most common mistakes is trusting UFW alone on a Docker host. Docker can program iptables rules that bypass UFW unless explicit policy controls are in place.
We never rely on one layer. Block ingress at the cloud firewall, enforce host-level rules, and keep the gateway private behind a tailnet or VPN.
The ClawHub supply chain risk
ClawHub is OpenClaw’s skills marketplace, and it carries the same supply-chain risk pattern seen in package registries. Skills run with whatever permissions the agent has, and low-friction publishing increases abuse risk.
For business deployments, whitelist vetted skills and audit source code before enabling community plugins.
Our recommended deployment model for Australian businesses
| Hosting model | Best fit | Security posture |
|---|---|---|
| Local Mac or PC + Tailscale | Solo founders and small teams | Strong when no public gateway exists |
| Sydney VPS + VPN or tailnet | Teams needing always-on access | Strong with strict firewall and private bind |
| Public VPS with direct exposure | Almost nobody | Weak and not recommended |
For most Australian teams, use a private-first model in an Australian data centre with no public gateway by default. Open public routes only when business requirements force it, and keep them behind authenticated reverse proxy controls.
Which version should you run?
As of March 2026, 2026.2.26 or later is the minimum
acceptable deployment baseline. Patch first, then validate auth
and network posture.
Frequently Asked Questions
Is OpenClaw safe to use for Australian businesses?
Yes, if you enforce private networking, proper authentication, current patch levels, and vetted skills. Most incidents in 2026 involved exposed gateways, stale versions, or malicious community skills.
What is the biggest OpenClaw security mistake?
Publicly exposing the gateway on 0.0.0.0 and
assuming token auth alone is sufficient. Network posture must be
private-first.
Do I need an OpenClaw security audit?
If your setup is public-facing, shared across staff, or connected to sensitive systems, yes. A short audit catches misconfigurations quickly and is far cheaper than incident response.
Need this checked by engineers who deploy OpenClaw every week?
We run a fast security pass that verifies gateway exposure, auth chain integrity, patch posture, and skill risk for your exact setup.