OpenClaw privilege escalation vulnerability

(nvd.nist.gov)

324 points | by kykeonaut 14 hours ago

28 comments

  • steipete 12 hours ago
    OpenClaw creator here.

    This was a privilege-escalation bug, but not "any random Telegram/Discord message can instantly own every OpenClaw instance."

    The root issue was an incomplete fix. The earlier advisory hardened the gateway RPC path for device approvals by passing the caller's scopes into the core approval check. But the `/pair approve` plugin command path still called the same approval function without `callerScopes`, and the core logic failed open when that parameter was missing.

    So the strongest confirmed exploit path was: a client that ALREADY HAD GATEWAY ACCESS and enough permission to send commands could use `chat.send` with `/pair approve latest` to approve a pending device request asking for broader scopes, including `operator.admin`. In other words: a scope-ceiling bypass from pairing/write-level access to admin.

    This was not primarily a Telegram-specific or message-provider-specific bug. The bug lived in the shared plugin command handler, so any already-authorized command sender that could reach `/pair approve` could hit it. For Telegram specifically, the default DM policy blocks unknown outsiders before command execution, so this was not "message the bot once and get admin." But an already-authorized Telegram sender could still reach the vulnerable path.

    The practical risk for this was very low, especially if OpenClaw is used as single-user personal assistant. We're working hard to harden the codebase with folks from Nvidia, ByteDance, Tencent and OpenAI.

    • nightpool 12 hours ago
      Can you speak a little bit more to the stats in the OP?

      * 135k+ OpenClaw instances are publicly exposed

      * 63% of those run zero authentication. Meaning the "low privilege required" in the CVE = literally anyone on the internet can request pairing access and start the exploit chain

      Is this accurate? This is definitely a very different picture then the one you paint

      • stingraycharles 2 hours ago
        That’s surprising, as the OpenClaw installation makes it pretty difficult to run without auth and explicit device pairing (I don’t even know if that’s possible).
    • blks 8 hours ago
      > We're working hard to harden the codebase with folks from Nvidia, ByteDance, Tencent and OpenAI.

      What exactly does this mean? You have contracts with these companies? People who work for them contributed sometimes in the past to openclaw repository?

      • marscopter 4 hours ago
        If I am not mistaken steipete works for OpenAI now as part of OpenClaw being acquired by them back in February.

        NVIDIA is contributing to the security of OpenClaw via NemoClaw.[0]

        Not sure about ByteDance and Tencent.

        0. https://www.nvidia.com/en-us/ai/nemoclaw/

      • thejarren 5 hours ago
        Jensen mentioned on a podcast (sorry I don’t have a link on me, it was either the all in podcast or Lex Friedman) that they are helping support and harden on the security side, and that he considers it like the “iPhone moment”

        Most of these larger players are interested in supporting anything that helps grow the ecosystem so broadly.

        • fg3fgq 4 hours ago
          Nvidia is willing to do anything to keep the hype going - there's a desperation to find a 'killer app'.
    • consumer451 2 hours ago
      I could not stop myself from looking at this user's submission history, looking for a ShowHN about Clawdbot. No such submission exists.

      I can understand why, but given that OpenClaw has taken over the world, I find the lack of a ShowHN somewhat interesting.

    • just_once 11 hours ago
      Nvidia, ByteDance, Tencent and OpenAI?! Wow!
      • gigel82 5 hours ago
        Good, hearty group right there. But how about Palantir, NSO Group, Flock and Axon? Aren't they lending a hand too?
    • mvdtnz 2 hours ago
      My reply which was not an attack was detached from this sub thread as an attack. All I did was ask a clarifying question about why Telegram and Discord were specifically called out in this reply despite not being mentioned by the OP at all. I'd still like an answer to this question.
    • doctorpangloss 3 hours ago
      [flagged]
  • Meneth 10 hours ago
    Text of the post has been [removed]. Original saved here: https://web.archive.org/web/20260403163241/https://old.reddi...
    • frenchtoast8 9 hours ago
      Maybe the moderators removed it for being AI spam. The user’s entire post history besides this post are generated ads for their AI projects.
    • dang 6 hours ago
      Thanks, we'll put that link in the toptext as well.
  • petcat 13 hours ago
    I don't use OpenClaw, but I still run my Claude Code and Codex as limited macOS user accounts and just have a script `become-agent <name> [cmd ...]` that does some sudo stuff to run as the limited user so they don't have any of my environment or directory access, or really any system-level admin access at all. They can use and write to their home directories as usual, which makes things easier to configure since those CLI harnesses really like when $HOME is configured and works as expected.

    It's a good compromise between running as me and full sandbox-exec. Multi-user Unix-y systems were designed for this kind of stuff since decades ago.

    • txprog 2 hours ago
      This is why kernel-level sandboxing matters. I use a sandbox name greywall that enforce filesystem/network isolation at the syscall level (Landlock + Seccomp + eBPF on linux, sandbox-exec on mac).

      I do disagree about unix system were designed for this kind of stuff. Unix was not designed for an agent to act like you and take decision for you...

    • w10-1 11 hours ago
      Yes, if/since that user have no access to your apple id and keychain...

      Not too much harder is using a VM:

      With Apple's open-source container tool, you can spin up a linux container vm in ~100ms. (No docker root)

      With Apple virtualization framework, you can run macOS in a VM (with a separate apple id).

      • petcat 11 hours ago
        > Yes, if/since that user have no access to your apple id and keychain...

        Right, these are system accounts. They don't have access to anything except their own home folder and whatever I put in their .bashrc. `sudo` is a pretty easy sandbox by itself and lets me manage their home folders, shell, and environment easily just with the typical Unix-isms. No need for mounting VM disks, persisting disk images, etc.

        I don't need virtualization to let Claude Code run. I just let it run as a "claude" user.

  • reenorap 11 hours ago
    The threads on that /r/sysadmin post sound exactly like every sysadmin I've ever worked with in my career.
  • niwtsol 13 hours ago
    Title is a bit misleading, no? You have to have openclaw running on an open box. And the post even says "135k open instances" out of 500k running instances? so a bit clickbait-y
    • 0cf8612b2e1e 13 hours ago
      1/5 rounds to “probably” when discussing security.
      • nickthegreek 13 hours ago
        The 135k number appears to be pulled out of thin air? No idea where the 65% comes from. The command the post gives to list paired devices isn't correct. These are red flags.
        • TZubiri 10 hours ago
          It's pretty reasonable though, a lot of OpenClaw instances are hosted on a VPS, this is not unsafe.

          My interpretation is that 135k instances are vulnerable, but of those there's more conditions that need to be met, specifically:

          These need to be multi-user systems where there are users with 'basic pairing' privileges. Which I don't think is very common, most instances are single-user.

          So way less than the 135k number. I think a more accurate title would have been "If you're running OpenClaw, you are probably vulnerable" but not "you probably got hacked", that's just outright false and there's no evidence that the exposed users were ALL hacked.

    • mey 13 hours ago
      More than 25% of users seems like a pretty accurate "probably".
      • DrewADesign 12 hours ago
        You know you’re getting into zealot territory when people are arguing semantics over the headline pointing to a zero authentication admin access vulnerability CVE that affects a double-digit percentage of users.
        • raincole 5 hours ago
          I mean... the reddit OP's comments are obviously AI-generated. It's quite obvious who is being 'zealot" here.
        • earnesti 12 hours ago
          Does it really? Digging up the data from example the 135k instances in the open reeks like bullshit, I would suspect several other claims are exaggerated as well.
          • DrewADesign 12 hours ago
            > Digging up the data from example the 135k instances in the open reeks like bullshit, I would suspect several other claims are exaggerated as well.

            Do you so stringently examine most CVEs? I’ll bet you don’t. Are you a big fan of this project? I’ll bet you are. Do you have any actual data to counter what they said or do you just sort of generally not vibe with it? If so, now would be a great time to break it out while this is still fresh. If not…

            • nickthegreek 12 hours ago
              They are pointing out the data provided does not appear to be real. There is no credible link to this 135k number. They do not need to provide a number, as one does not appear to exist.
              • DrewADesign 10 hours ago
                Well the post was removed so that’s not very promising on their part.
      • peacebeard 13 hours ago
        Today I learned nobody agrees on what the word "probably" means.
        • SequoiaHope 12 hours ago
          Ya I thought it meant “more probable than not” ie 50+%.

          Otherwise I would say “you may have been hacked” not “you probably have been hacked”.

          • lwansbrough 12 hours ago
            That is what it means. Unless you're losing an argument on the internet and you need a word to hide behind. ;)
        • zephen 12 hours ago
          You're probably right.
      • furyofantares 13 hours ago
        Here's a statement that's about 3x as true then:

        If you're running OpenClaw, you probably didn't get hacked in the last week.

    • earnesti 13 hours ago
      The 135k instances is likely not true at all.
    • yonatan8070 11 hours ago
      This sounds like a classic case of "35% of statistics are made up"
      • koolba 5 hours ago
        Over 50% of people have a below average understanding of statistics.
      • sdenton4 5 hours ago
        That's funny. In my study it was 70%. Nah, make that 85%.
    • DrewADesign 13 hours ago
      It’s also only 65% of those that have zero authentication configured, according to that post (which I have done nothing to confirm or challenge at all… Frankly I wouldn’t touch OpenClaw with a ten foot… cable?) That said, I think it’s far more important to get people’s attention who might otherwise not realize how closely they need to pay attention to CVEs than it is to avoid hyperbole in headlines.
      • codechicago277 12 hours ago
        Not if this is crying wolf and causing those same people to ignore the very real security risks with using OpenClaw.
        • DrewADesign 12 hours ago
          How is 20% of users getting pwned ”crying wolf” by any reasonable measure? This is a zero authentication admin access vulnerability.
          • codechicago277 11 hours ago
            Because 20% is not “probably got hacked” and overstates the problem for most users.

            That doesn’t mean this isn’t a critical vulnerability, and I think it’s insane to run OpenClaw in its current state. But the current headline will burn your credibility, because 80% of users will be fine with no action, and they’ll take future security issues less seriously as a result.

          • nickthegreek 11 hours ago
            All the numbers you are using appear to be made up by the reddit poster. I say that as they provided no citation to them (for all I know they got them from an AI). I attempted to verify any of the numbers he used and could not. By exaggerating the numbers he is crying wolf.
            • DrewADesign 10 hours ago
              Well the post was removed so it doesn’t lend a lot of support to their claims.
  • Simon321 13 hours ago
    Only if your openclaw instance is publicly exposed on the internet... which is not the case for most people
    • causal 13 hours ago
      Until recently, this was default configuration

      Edit: Default binding was to 0.0.0.0, and if you were not aware of this and assumed your router was keeping you safe, you probably should not be using OpenClaw. In fact some services may still default to 0.0.0.0: https://github.com/openclaw/openclaw/issues/5263

      https://github.com/openclaw/openclaw/commit/5643a934799dc523...

      • nickthegreek 13 hours ago
        Not true. So many people love to come out of the woodwork on these openclaw posts who have no first hand knowledge of the software. It is stunning.
      • earnesti 13 hours ago
        I have used openclaw pretty long but at no point it has proposed doing anything like that.
      • charcircuit 13 hours ago
        Since pretty much the beginning it wasn't and the documentation explicitly warned not to make it public, exposing it to the internet. It included information on how you can properly forward the gateway port to your machine without opening it up to the internet.
  • Leomuck 12 hours ago
    Well, such things were to be expected. It's easy to bash on all the people who haven't gotten the necessary IT understanding of securing such things. Of course, it's uber-dumb to run an unprotected instance. But at the same time, it's also quite cool that so many people can do interesting IT stuff now. I'm thinking basically it's a trade-off. Be able to do great stuff, live with the consequences of doing that without proper training. Like repairing your car yourself. You might have fun doing it, it might get you somewhere, but you have to accept that if you have no idea about cars, you just introduced a pretty big risk into your life (say if you replaced the brakes or something). But yea, security, privacy, fighting climate change, all very much on the decline - humans doing cool things, ignoring important things - we'll have to live with the consequences.
    • paulhebert 12 hours ago
      Gonna be honest. I'd rather fight climate change than have people run LLMs unsecured
      • Xunjin 12 hours ago
        Yeah... The bill is already being paid. I wonder how the life quality of my nephew (and other children) of 5 years old today will be in the near future..
    • butlike 11 hours ago
      With your car example, you also assume the risk unto others. If your "chopper" of a car hits and kills someone else, and you survive, you're paying for the consequences of that. I don't think it's cool that untrained people can do interesting IT stuff now. I see it as a huge liability where some unsecured instance pwns the internet, then it's some 12 year old that gets marched in front of congress and everyone goes: "wtf?" There's essentially no accountability and the damage is still done.
  • earnesti 13 hours ago
    I don't think enabling admin on open internet is a default behaviour by any means?
  • rvz 13 hours ago
    OpenClaw has over 400+ security issues and vulnerabilities. [0]

    Why on earth would you install something like that has access to your entire machine, even if it is a separate one which has the potential to scan local networks?

    Who is even making money out of OpenClaw other than the people attempting to host it? I see little use out of it other than a way to get yourself hacked by anyone.

    [0] https://github.com/openclaw/openclaw/security

    • da_grift_shift 1 hour ago
      Wow. The advisories page is worthy of a post in itself.
    • nickthegreek 13 hours ago
      It does not need access to your full machine. It can literally run in a vps.
      • rob 12 hours ago
        Most of the people using it probably don't even know what SSH is, let alone using a VPS to maintain a personal bot for them for years with no maintenance. They know Vercel and Supabase. They will run it on their local machine and just keep clicking yes to everything until they get the result they want.
        • nickthegreek 10 hours ago
          That is not how the software works.. I take it you have no first hand knowledge with this stack? This isn't a double click the exe and you are off the races. The hostinger vps is actually the easiest way for a normie to get this running.
      • fraywing 13 hours ago
        How do you think the vibe-coding layman audience is using OpenClaw?
        • yoyohello13 1 hour ago
          Based on the hype, a Mac mini.
        • nickthegreek 13 hours ago
          Hostinger vps if youtube is any indication. Also its actually hard for a layman to run this software.
        • butlike 11 hours ago
          "All you have to do is run the command `/yolo` to start your instance of OpenClaw."

          /s

      • eloisant 11 hours ago
        The thing is that if you want it to do useful things, you kinda have to give it access to some of your accounts.
        • nickthegreek 10 hours ago
          This is not true. It is useful without having access to a single account of mine. My setup runs on its own accounts and hardware. Obviously it is not sending out emails from my inbox, but that is not a usecase of any value to me. And if it was, there are actually plenty of ways to do that safely as well.

          If you think you need to give it the keys to your kingdoom to be useful, you are not actually experimenting with this stack but regurgitating the words of others. I really don't understand the mindset of comments like this.

          • johanyc 6 hours ago
            What do you use it for
  • kube-system 12 hours ago
    If someone could forward the SSH port from my VPS to access my instance, I already had bigger problems.
  • sva_ 13 hours ago
    > 4. System grants admin because it never checks if you are authorized to grant admin

    Shipping at the speed of inference for real.

  • ritcgab 4 hours ago
    Isn't OpenClaw itself a privilege escalation?
  • throwatdem12311 13 hours ago
    Think of all the people that are too ignorant to even understand the basics of any of this that are running OpenClaw. They will be completely unaware and attackers can easily hide their tracks by changing system prompts (among plenty of other things).

    This is bad.

  • rossjudson 11 hours ago
    With respect...Security through obscurity is dead. We are approaching the point where only formally verified (for security) systems can be trusted. Every possible attack will be attempted. Every opening will be exploited, and every useful combination of those exploits will be done.

    LLMs are patient, tireless, capable of rigorous opsec, and effectively infinite in number.

  • redoh 3 hours ago
    [dead]
  • sunaookami 12 hours ago
    Honest question: What do people actually USE OpenClaw for? The most common usage seems to be "it reads your emails!", that's the exact opposite of "exciting"...
    • sgillen 12 hours ago
      I've only been playing with it recently ... I have mine scraping for SF city meetings that I can attend and public comment to advocate for more housing etc (https://github.com/sgillen/sf-civic-digest).

      It also have mine automatically grabs a spot at my gym when spots are released because I always forget.

      I'm just playing with it, it's been fun! It's all on a VM in the cloud and I assume it could get pwned at any time but the blast radius would be small.

      • gruez 12 hours ago
        >It also have mine automatically grabs a spot at my gym when spots are released because I always forget.

        seems far more efficient/reliable to get codex/claude code to write and set up a bot that does this.

        • Sargos 11 hours ago
          >set up a bot that does this

          But he already did this. With a bonus of it will continue to work in the future if something breaks or changes. Human time is more precious than computing resources nowadays.

      • mvdtnz 12 hours ago
        [flagged]
        • gruez 12 hours ago
          No? The comment was admittedly ambiguous but if you go to repo it's far clearer:

          >I use it to give me a weekly digest of what happened in my neighborhood and if there are any public hearings or trash pickups I might want to attend.

          • WhrRTheBaboons 12 hours ago
            that does not seem like something you need an 'autonomous' agent for.
            • Sohcahtoa82 12 hours ago
              What would you propose as an alternative?

              Anything not relying on an LLM likely means having to write bespoke scripts. That's not really worth the time, especially when you want summaries and not having to skim things yourself.

              Going from doing it manually on a regular basis to an autonomous agent turns a frequent 5-15 minute task into a 30 second one.

              • mvdtnz 11 hours ago
                > Anything not relying on an LLM likely means having to write bespoke scripts.

                The very first line in your readme is "CivicClaw is a set of scripts and prompts" though? And almost the entire repo is a bunch of python scripts under a /scripts folder.

                I looked at one randomly chosen script (scripts/sf_rec_park.py) and it's 549 lines of Python to fetch and summarise data that is available on an RSS feed ( https://sanfrancisco.granicus.com/ViewPublisher.php?view_id=... )

                • Gracana 11 hours ago
                  Parent isn't saying that bespoke scripts are bad, just that it's not worth their time to write them. The value of the bot is that it can do that for you.
            • butlike 11 hours ago
              They've created a public bulletin board for themselves, like a café's blackboard, or a city telephone pole.
    • rubslopes 10 hours ago
      I don't use this one, but a simpler one, also running on a vps. I communicate via telegram.

      I say to it: check my pending tasks on Todoist and see if you can tackle on of those by yourself.

      It then finds some bugs in a webapp that I took note. I tell it to go for it, but use a new branch and deploy it on a new url. So it clones the repo, fix it, commit, push, deploy, and test. It just messages me afterwards.

      This is possible because it has access to my todoist and github and several other services.

    • earnesti 12 hours ago
      I use it for a side project. I just put it on VPS, and then it edits the code and tests it. The nice thing is that I can use it on the go whenever I have spare moment. It is addictive, but way better addiction than social media IMO.

      The thing where you give it access to all your personal data and whatever I haven't done and wouldn't do.

    • knights_gambit 11 hours ago
      I use it to manage a media server. And use natural language to download movies and series. Also I use to for homeassistant so I csn use natural language for vacuuming the house and things like that. I do use it for a number of other tasks but those are the most partical.
      • nickthegreek 10 hours ago
        Good use cases, but I do want to point out that you can do all of that with HA itself. Are you using skills to talk to *arr services?
    • qingcharles 9 hours ago
      I was asked by someone recently to try to set up an OpenClaw that would search for ordinances and other land registry information for all 3000+ counties/parishes in the USA to obtain and distill specific details on their support for building tiny homes.
      • mvdtnz 2 hours ago
        What is OpenClaw doing here that Claude Desktop or Claude Code couldn't do?
        • qingcharles 59 minutes ago
          Claude Desktop and Code are built for synchronous, human-in-the-loop interactions. Scraping 3000 janky municipal websites, you need a "fire-and-forget" background worker. Claw lets you kick off a massive job and just get a ping when it's done.

          I'd also instantly hit Claude Desktop's rate limits with this I reckon. Since Claw uses APIs, you bypass those limits and can route the messy scraping to cheap models, saving expensive ones for the actual analysis. It also handles Playwright integration and state persistence out of the box so a crash doesn't wipe your progress.

          If I'm wrong, I'm open to learning. I'm as new to this as everyone :)

    • operatingthetan 10 hours ago
      I use it mostly for the crons, it runs a personal productivity system that tracks my tasks, provides nudges, talks through stuff etc. It's all stored in an Obsidian vault that syncs to my desktop. I don't use it to control email/calendars or other agents.
    • veganmosfet 10 hours ago
      I am experimenting prompt injection on OpenClaw [0][1], quite exciting.

      [0] https://itmeetsot.eu/posts/2026-03-27-openclaw_webfetch/

      [1] https://itmeetsot.eu/posts/2026-03-03-openclaw3/

    • _doctor_love 12 hours ago
      Assuming you're asking in good faith, IMHO the deeper story around OpenClaw is that it's the core piece of a larger pattern.

      The way I'm seeing folks responsibly use OpenClaw is to install it as a well-regulated governor driving other agents and other tools. It is effectively the big brain orchestrating a larger system.

      So for instance, you could have an OpenClaw jail where you-the-human talk to OpenClaw via some channel, and then that directs OpenClaw to put lower-level agents to work.

      In some sense it's a bit like Dwarf Fortress or the old Dungeon Keeper game. You declare what you want to have happen and then the imps run off and do it.

      [EDIT: I truly down understand sometimes why people downvote things. If you don't like what I'm saying, at least reply with some kind of argument.]

      • j-bos 12 hours ago
        So I neither downvoted nor upvoted you, but I think people may be downvoting, in addition to the fact that they just don't like the thing, based on the fact that you didn't directly answer the question. Specifically, what are you using it for, not what hypothetically it would be used for.
      • mvdtnz 12 hours ago
        You're probably being downvoted because you didn't answer the question. The questioner specifically asked what people are using it for and you answered by describing your technical setup. What we want to know is, what are you actually achieving with this tool?
      • PKop 12 hours ago
        First words out of your mouth are to accuse OP of not seriously asking the question. Then you write paragraphs saying nothing much at all. You could have simply answered the question in a simple straightforward manner.
      • _doctor_love 10 hours ago
        Man, all the replies to my comment. Do you guys know how to fucking read?
        • the_pwner224 9 hours ago
          You have yet to answer the original question - what do you actually do with OpenClaw? A concrete example of something that actually happens, not a system architecture description.
        • PKop 9 hours ago
          Name 2 things you actually do with OpenClaw. And don't swear in your response.
    • FrameworkFred 10 hours ago
      so far, I've used it to kill a bunch of time trying to get it to respond to "Hi @Kirk" in a private Slack channel.

      ...and to laugh a little every time it calls me "commander" or asks "What's the next mission?" or (and this is the best one) it uses the catchphrase I gave it which is "it's probably fine" (and it uses it entirely appropriately...I think there must have been a lot of sarcasm in qwen 3.5's training data)

      and I've treated it like it's already been compromised the whole time.

      • globular-toast 10 hours ago
        So basically an eggdrop like we had in the 90s except, by the sounds of it, less useful and considerably less fun.
        • nickthegreek 10 hours ago
          Having this in a discord is actually like having an eggdrop on steroids. I would of lost my mind having this on efnet in the late 90s.
    • dyauspitr 12 hours ago
      Agent based chron jobs mostly that work with other agents. It’s really nice if you want to tell your computer to do something repeatedly or in confluence with many other agents in a very simple way. Like check my email for messages from Nadia and send me a notification and turn on all the lights in my driveway when she gets there without having to actually get into the nuts and bolts of implementing it. It’s actually really powerful and probably what Siri should be.
      • rustystump 3 hours ago
        I think this is close to the head of the nail. It kinda unlocks handling novelish asks that previous siri/alexa just couldnt handle. As long as a thing has well documented api spec then it instantly is usable. This makes the clawbot flow extraordinarily more useful.

        I think devs are too focused on the technical what did u build with it.

        For example. My brother runs a small recruiting agency. Super nontechnical. Out of nowhere he asks me about openclaw. Then with no help, he sets it up and uses it. Still no help, he has all kinds of nonsense hooked up and running blowing through tokens. He is blown away by it and wants to get it for all of his employees. He thinks about it in terms of cost per min running and not in tokens.

        This is the sticky gooey value to whatever openclaw is doing.

    • franze 11 hours ago
      my claw controls my old M2 mac, mostly my claw uses Claude code to code
      • operatingthetan 11 hours ago
        So you're using a different llm to control claude code to get around the Anthropic TOS about openclaw usage?
        • paganel 10 hours ago
          At this point I'm personally lost, unless GP's comment wasn't some sort of satire (which would be valid, this being a topic about AI).
    • browningstreet 12 hours ago
      [flagged]
      • sunaookami 12 hours ago
        Obviously I already searched the web (not specifically HN I must admit) and there were always incredibly generic non-answers that ultimately say nothing (and they assume you have 3000$ per month or 2000 Mac Minis on your desk (hyperbole)).
        • ziml77 12 hours ago
          Incredibly, one of the responses you got already is exactly one of those replies that says nothing. There's a whole bunch of words that don't actually answer the question.
        • emp17344 12 hours ago
          I think you’ve got your answer, then. If nobody can tell you what it’s really used for, it likely doesn’t have any real use cases.
      • freedomben 12 hours ago
        yeah I don't normally say "read previous HN articles" but it has been asked at least once in every article here.
    • emptysongglass 11 hours ago
      I'm so tired of answering this question so I simply won't.

      Your best way of finding if it's useful for you is to install it and explore, just like you would with any other software tool.

      • equasar 11 hours ago
        [flagged]
        • emptysongglass 11 hours ago
          Why don't you try it yourself instead of making uninformed claims
          • equasar 9 hours ago
            Why would I do that? I am entirely good using LLMs like Claude building tools for me. There's no use case for OpenClawthat I am aware of can replace of what I have/need.

            I think it makes my point strong, people who uses OpenClaw, might be lazy on how to do things properly with LLMs.

          • DonHopkins 11 hours ago
            [flagged]
      • DonHopkins 11 hours ago
        Before I decide to shoot up smack, I like to ask junkies what the whole heroin experience is like, what they use it for, and how it has affected their lives.

        Nina Hagen - Smack Jack

        https://www.youtube.com/watch?v=nIDnN34ZZaE

        >Smack Ist Dreck, Stop It Oder Verreck!

        • emptysongglass 11 hours ago
          So you're comparing a generic tool you can tailor to your own needs to drugs?

          This is exactly why I have zero interest in engaging with people over this topic.

  • machinecontrol 12 hours ago
    The root issue is that OpenClaw is 500K+ lines of vibe coded bloat that's impossible to reason about or understand.

    Too much focus on shipping features, not enough attention to stability and security.

    As the code base grows exponentially, so does the security vulnerability surface.

    • tomhow 10 hours ago
      We detached this subthread from https://news.ycombinator.com/item?id=47629849 and marked it off-topic.
    • williamstein 11 hours ago
      The current OpenClaw GitHub repo [1] contains 2.1 million lines of code, according to cloc, with 1.6M being typescript. It also has almost 26K commits.

      [1] https://github.com/openclaw/openclaw

    • earnesti 11 hours ago
      There are like 10 openclaw clones out there. If you prefer security over features, just pick up another one.
      • yoyohello13 1 hour ago
        Or you can just make your own. The core pattern is not difficult to clone.
      • crustaceansoup 10 hours ago
        They exist; are any of them secure?
    • dyauspitr 12 hours ago
      [flagged]
      • Retr0id 12 hours ago
        Aside from "exponentially" being hyperbolic, which part is unsubstantiated?
      • pezo1919 12 hours ago
        This is a vibe based comment. It’s a generic attack with no meat.
  • jeremie_strand 3 hours ago
    [dead]
  • dang 6 hours ago
    [stub for offtopicness and general piling-on behavior, which we don't want on this site]

    [[attacking project creators when they show up to discuss their work is particularly harmful; please don't ever do that here]]

    [[[if you posted any of these, we'd appreciate it if you'd please review https://news.ycombinator.com/newsguidelines.html and stick to the rules from now on]]]

    • rybosome 10 hours ago
      [flagged]
    • plestik 12 hours ago
      [flagged]
      • tomhow 10 hours ago
        We detached this subthread from https://news.ycombinator.com/item?id=47629849 and marked it off-topic.
        • plestik 8 hours ago
          Why?
          • tomhow 7 hours ago
            It breaks several guidelines:

            Be kind. Don't be snarky. Converse curiously; don't cross-examine. Edit out swipes.

            Comments should get more thoughtful and substantive, not less, as a topic gets more divisive.

            Please don't fulminate. Please don't sneer.

            Please don't post shallow dismissals, especially of other people's work. A good critical comment teaches us something.

            The guidelines still apply, even if you feel negatively towards a project and its creator. Indeed it's even more important to make the effort to heed the guidelines for topics you feel negatively towards (after all, it's easy to be respectful about things we feel positively towards).

            https://news.ycombinator.com/newsguidelines.html

      • inetknght 12 hours ago
        > There used to be a time where people who shipped CVEs took accountability.

        I see you haven't heard of Microsoft...

      • orsorna 10 hours ago
        [flagged]
      • ua709 11 hours ago
        What time was that and who do we get to blame for Log4j?
      • lp0_on_fire 12 hours ago
        Have you met these AI companies yet?
    • rob 12 hours ago
      [flagged]
      • rdtsc 11 hours ago
        - "OpenClaw, read the code"

        - "You're absolutely right. One should read and understand their own code. I did, and it looks great"

      • TZubiri 10 hours ago
        I'm critical of OpenClaw and even the author to some extent, but I prefer to have nuanced and compartmentalized conversations, on a thread about a specific vulnerability, it's much more productive to talk about the specific vulnerability rather than OpenClaw as a whole. Otherwise we would only have generic OpenClaw conversations and we would only be saying the same thing.
        • maxbond 10 hours ago
          The comment could have been more substantive but it isn't generic or tangential. Discussing a vulnerability ultimately means discussing the failures of process that allowed it to be shipped. Especially with these application-level logic bugs that static analyzers can't generally find, the most productive outcome (after the vulnerability is fixed) is to discuss what process changes we can make to avoid shipping the next vulnerability. I'm sure there's hardening that can be done in OpenClaw but the premise of OpenClaw is to integrate many different services - it has a really large attack surface, only so much can be done to mitigate that, so it's critical to create code review processes that catch these issues.

          OpenClaw is probably entering a phase of it's life where prototype-grade YOLO processes (like what the tweet describes) aren't going to cut it anymore. That's not really a criticism, the product's success has over vaulted it's maturity, which is a fortunate problem to have.

    • fraywing 13 hours ago
      [flagged]
      • jstanley 13 hours ago
        But this is nothing to do with the agent being tricked. This is ordinary old-fashioned code being tricked!
        • paulhebert 12 hours ago
          But was the code written by an agent? It's agents all the way down
        • fraywing 13 hours ago
          [dead]
    • popalchemist 12 hours ago
      [flagged]
    • podgorniy 13 hours ago
      [flagged]
      • tgv 13 hours ago
        Your comment is obviously against the rules, but I read it as: Why are people not more careful? This is some unknown, app, with unknown, unvetted depths, and you only like it because other people say it's shiny and AI. It made you giddy, and you forgot that giving a tool permissions is an invitation to hackers. Well, you went ahead and ignored all common sense, and here we are.
    • bigstrat2003 11 hours ago
      If you're running OpenClaw, you already threw security and reliability out the window by running LLMs on the command line. It's a bit late to start worrying now.
    • deadbabe 13 hours ago
      [flagged]
      • butlike 11 hours ago
        • deadbabe 7 hours ago
          That razor is poorly understood. It’s not malice if it can be explained by stupidity. In this case it’s not explained by stupidity, as the guy who made OpenClaw is very smart. Therefore, it can only be malice.
      • EA-3167 13 hours ago
        In this case I'd say that it was made not to enable that, but in total disregard of its realistic uses and risks. In a sense this is less... deliberate poisoning, and more doing a bad job cutting heroin with fentanyl for distribution. Yeah the result is the same, but the cause is negligence to the point of parody rather than outright malice.
        • throwatdem12311 13 hours ago
          Some people are so stupid it is indistinguishable from evil.
      • cactusplant7374 13 hours ago
        What reason would Steinberger have for doing that? It was his hobby project.
        • crazy5sheep 13 hours ago
          [dead]
        • throwatdem12311 13 hours ago
          You can’t think of a single reason?

          Intelligence asset.

          Useful idiot.

          Plenty of reasons.

        • asdff 13 hours ago
          He doesn't need a reason. He could have been captured by intelligence after the fact.
    • 8593376393 8 hours ago
      [dead]
    • mvdtnz 12 hours ago
      [flagged]
    • LucidLynx 11 hours ago
      [flagged]
    • hmokiguess 11 hours ago
      [flagged]
    • neya 12 hours ago
      [flagged]
      • imiric 9 hours ago
        If you considered using it in the first place, reports of security vulnerabilities wouldn't concern you.
      • pezo1919 11 hours ago
        “It’s OK to be hacked until everyone is getting hacked.”
    • equasar 11 hours ago
      [flagged]
    • sbochins 10 hours ago
      [flagged]
      • dang 6 hours ago
        Please don't cross into personal attack. It destroys what this site is for, and you can always make your substantive points without it.

        https://news.ycombinator.com/newsguidelines.html

        • croes 6 hours ago
          Didn‘t know that pointing out a lack of accountability is seen as personal attack.

          Who wants the fame must also take the blame.

          Especially if they create a dangerous tool.

    • pym4n 12 hours ago
      Guys, OpenClaw is a toy, that's it!
  • hyperlambda 12 hours ago
    [flagged]
  • roangeller 10 hours ago
    [flagged]
  • RodMiller 10 hours ago
    [dead]
  • n1tro_lab 11 hours ago
    [flagged]
  • gloosx 10 hours ago
    [flagged]
  • gos9 13 hours ago
    Really? Posting AI generated Reddit post with no sources or anything?
  • blharr 13 hours ago
    [flagged]
    • dgellow 13 hours ago
      Flag then move to the next one
    • throwatdem12311 13 hours ago
      As if the non-Reddit links aren’t majority AI slop already.
  • throwpoaster 10 hours ago
    The Ludditism in this thread, and the linked thread, is shocking.
    • yoyohello13 55 minutes ago
      We need a new word for people who use the word ‘Luddite’ to refer to ‘reasonable concern over the reckless use of new technology’.
    • weakfish 8 hours ago
      Is it Ludditism to not want to get PWNed spending $3k a month?
      • nickthegreek 3 hours ago
        Setting it up that way is a choice a user would have to make. Just set it up on an oauth or budgeted api and not be an idiot. Setup additional guardrails in OC if you think are necessary.
      • throwpoaster 7 hours ago
        Yes.

        All new technology has issues. Figure it out.

        Especially if you're spending $3k per month on inference, have the model fix the agent.

        I suppose the idea is to wait for someone else to productize it.

        Lazy.

    • 8593376393 7 hours ago
      [dead]