JOIN US >> We’re hosting a global broadcast on Tuesday, Feb. 10, featuring AI red teaming experts to discuss the security implications of OpenClaw. Register here.
OpenClaw, an open-source AI agent previously known as Clawdbot and Moltbot, is a powerful personal assistant that can connect to LLMs, integrate with external APIs, and autonomously execute an array of tasks like sending email or controlling browsers.
While OpenClaw carries the promise of AI-driven productivity, it also presents growing security concerns.
OpenClaw is installed on local machines or dedicated servers. It stores configuration data and interaction history locally, which allows its behavior to persist across sessions. Because it’s designed to run locally, users often give it expansive access to terminal, files, and in some cases, root-level execution privileges.
If employees deploy OpenClaw on corporate machines and/or connect it to enterprise systems and leave it misconfigured and unsecured, it could be commandeered as a powerful AI backdoor agent capable of taking orders from adversaries. Since the open source project has skyrocketed past 150,000 GitHub stars in the past few days, this poses a growing risk.
A range of malicious activity could threaten OpenClaw deployments. Adversaries can submit malicious instructions directly to exposed OpenClaw instances or indirectly by embedding instructions in data sources ingested by OpenClaw, such as emails or webpages. If successful, these attacks can leak sensitive data from connected systems or hijack OpenClaw’s agentic capabilities to conduct reconnaissance, move laterally, and execute adversaries’ instructions.
In this blog, we discuss how the CrowdStrike Falcon® platform helps our customers identify OpenClaw deployments, understand their exposure, and mitigate their risk.
Gain Visibility into OpenClaw Deployments
Before mitigation, security teams need to understand where OpenClaw is deployed, how it is running, and whether it is exposed. The CrowdStrike Falcon platform provides a number of different discovery mechanisms that reveal where OpenClaw is installed. Customers using Falcon endpoint security modules have powerful visibility to investigate full process trees of OpenClaw executing system tools, and detection and prevention capabilities to stop malicious executions either via injection or hallucinations.
All CrowdStrike endpoint customers have visibility into OpenClaw running on local machines via the AI Service Usage Monitor dashboard in CrowdStrike Falcon® Next-Gen SIEM. This visibility comes from observed DNS requests to openclaw.ai and also reveals the third-party models that OpenClaw may use.