News: 1770657810

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

More than 135,000 OpenClaw instances exposed to internet in latest vibe-coded disaster

(2026/02/09)


It's a day with a name ending in Y, so you know what that means: Another OpenClaw cybersecurity disaster.

This time around, SecurityScorecard's STRIKE threat intelligence team is sounding the alarm over the sheer volume of internet-exposed OpenClaw instances it discovered, which numbers more than 135,000 as of this writing. When combined with previously known vulnerabilities in the vibe-coded AI assistant platform and links to prior breaches, STRIKE warns that there's a systemic security failure in the open-source AI agent space.

"Our findings reveal a massive access and identity problem created by poorly secured automation at scale," the STRIKE team wrote in a [1]report released Monday. "Convenience-driven deployment, default settings, and weak access controls have turned powerful AI agents into high-value targets for attackers."

[2]

For those unfamiliar with the saga of Clawdbot, er Moltbot, no, wait, OpenClaw (it keeps changing names), it's an open-source, vibe-coded agentic AI platform that has been, frankly, an unmitigated disaster for those worried about security. OpenClaw's skill store, where users can find extensions for the bot, is [3]riddled with malicious software . [4]Three [5]high-risk [6]CVEs have been attributed to it in recent weeks, and it's also been reported that its various skills can be easily cracked and forced to spill API keys, credit card numbers, PII, and other data valuable to cybercriminals.

[7]

[8]

Take a bunch of those already vulnerable instances and give them free rein to access the internet, as STRIKE has discovered happening around the world, and those problems are quickly magnified.

STRIKE's summary of the problem doesn't even do it justice, as the number of identified vulnerable systems has skyrocketed on its live OpenClaw threat [9]dashboard since publication several hours before our story.

[10]

Take the aforementioned 135,000+ internet-facing OpenClaw instances - that number is as of our writing; when STRIKE published its report earlier today, that number was at just over 40,000. STRIKE also mentioned 12,812 OpenClaw instances it discovered being vulnerable to an established and already patched [11]remote code execution bug. As of this writing, the number of RCE-vulnerable instances has jumped to more than 50,000. The number of instances detected that were linked to previously reported breaches (not necessarily related) has also skyrocketed from 549 to over 53,000, as has the number of internet-facing OpenClaw instances associated with known threat actor IPs.

In other words, this is nothing short of a disaster in the making, all thanks to a suddenly-popular AI tool vibe-coded into existence with little regard to the safety of its codebase or users.

That's not to say users aren't at least partially to blame for the issue. Take the way OpenClaw's default network connection is configured.

[12]

"Out of the box, OpenClaw binds to `0.0.0.0:18789`, meaning it listens on all network interfaces, including the public internet," STRIKE noted. "For a tool this powerful, the default should be `127.0.0.1` (localhost only). It isn't."

STRIKE recommends all OpenClaw users, at the very least, immediately change that binding to point it to localhost. Outside of that, however, SecurityScorecard's VP of threat intelligence and research Jeremy Turner wants users to know that most of the flaws in the system aren't due to user inattention to defaults. He told The Register in an email that many of OpenClaw's problems are there by design because it's built to make system changes and expose additional services to the web by its nature.

"It's like giving some random person access to your computer to help do tasks," Turner said. "If you supervise and verify, it's a huge help. If you just walk away and tell them all future instructions will come via email or text message, they might follow instructions from anyone."

As STRIKE pointed out, compromising an OpenClaw instance means gaining access to everything the agent can access, be that a credential store, filesystem, messaging platform, web browser, or just its cache of personal details gathered about its user.

[13]Clouds rush to deliver OpenClaw-as-a-service offerings

[14]GitHub ponders kill switch for pull requests to stop AI slop

[15]AI agents can't yet pull off fully autonomous cyberattacks – but they are already very helpful to crims

[16]Open-source AI is a global security nightmare waiting to happen, say researchers

And with many of the exposed OpenClaw instances coming from organizational IP addresses and not just home systems, it's worth pointing out that this isn't just a problem for individuals mucking around with AI.

Turner warns that OpenClaw isn't to be trusted, especially in organizational contexts.

"Consider carefully how you integrate this, and test in a virtual machine or separate system where you limit the data and access with careful consideration," Turner explained. "Think of it like hiring a worker with a criminal history of identity theft who knows how to code well and might take instructions from anyone."

That said, Turner isn't advocating for individuals and organizations to completely abandon agentic AI like OpenClaw - he simply wants potential users to be wary and consider the risks when deploying a potentially revolutionary new tech product that's rife with vulnerabilities.

"All these new capabilities are incredible, and the researchers deserve a lot of credit for democratizing access to these new technologies," Turner told us. "Learn to swim before jumping in the ocean."

Or just stay out altogether - the ocean is terrifying. ®

Get our [17]Tech Resources



[1] https://securityscorecard.com/blog/beyond-the-hype-moltbots-real-risk-is-exposed-infrastructure-not-ai-superintelligence/

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aYpnE3vsz1Yu8dTPhR3o2AAAAIg&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://www.theregister.com/2026/02/03/openclaw_security_problems/

[4] https://www.cvedetails.com/cve/CVE-2026-25253

[5] https://www.cvedetails.com/cve/CVE-2026-25157

[6] https://www.cvedetails.com/cve/CVE-2026-24763

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aYpnE3vsz1Yu8dTPhR3o2AAAAIg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[8] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aYpnE3vsz1Yu8dTPhR3o2AAAAIg&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[9] https://declawed.io/

[10] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aYpnE3vsz1Yu8dTPhR3o2AAAAIg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[11] https://www.theregister.com/2026/02/02/openclaw_security_issues/

[12] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aYpnE3vsz1Yu8dTPhR3o2AAAAIg&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[13] https://www.theregister.com/2026/02/04/cloud_hosted_openclaw/

[14] https://www.theregister.com/2026/02/03/github_kill_switch_pull_requests_ai/

[15] https://www.theregister.com/2026/02/03/autonomous_cyberattacks_not_real_yet/

[16] https://www.theregister.com/2026/02/01/opensource_ai_is_a_global/

[17] https://whitepapers.theregister.com/



Clueless Users

VoiceOfTruth

>> "It's like giving some random person access to your computer to help do tasks,"

Indeed. See it on the internet, download and install it, then point a finger afterwards: it shouldn't be allowed.

Their passwords are probably 'password1' or something like that. Or they follow GPS into a river.

Re: Clueless Users

elsergiovolador

hunter2

Re: Clueless Users

David 132

Pfft. N00b.

“swordfish” or “********”.

FFS people ... engage brain and think about what you are doing !!!

Anonymous Coward

'vibe-coded agentic AI platform' ... what about this combination of words screams 'please use me without any thought at all' !!!

Even people who supposedly know what they are doing are finding 'AI' in all its forms 'difficult' to use, particularly if 'Security' is important.

When is the 'penny going to finally drop' and people realise that 'AI' is not risk-free no matter how skilled you are.

At what point do you begin to think that 'accidental' is no longer an excuse that can be used when there are warnings virtually every hour telling you to NOT swim in this pool ... 'There be sharks and much MUCH nastier things !!!'

I have NO sympathy left for the idiots who are 'playing' with 'AI' anymore !!!

You all deserve what you get ... there cannot be any more warnings necessary ... what happens from now on is 100% negligence and should be punished as such.

If you are impacted by this nonsense because someone did not think then sue the idiots out of business !!!

:)

Bind to a different address?

IGotOut

You think 99.999% of people using this actual know how to do that?

Re: Bind to a different address?

JLV

well, it IS a one-click install, no configuration required, is it not? OK, cut and paste:

> curl -fsSL https://youre-fucked-now.ai/install.sh | bash

Yes, I changed the url so someone here wouldn't just run it. but it is their actual installation method, on their installation page. And, no, it doesn't have an extra "securing your configuration" paragraph that follows.

OpenClaw

TimMaher

What is this supposed to actually do?

Re: OpenClaw

Anonymous Coward

If you are capable of asking this question then you are NOT the intended audience and don't need to worry about 'What does this actually do ???'.

:)

JLV

https://www.youtube.com/watch?v=40SnEd1RWUU&t=392s

"... Now you start configuring your application (OpenClaw) security measures so it doesn't start deleting your Gmail or leak your Ethereum wallet if somebody start messaging malevolent commands to your Telegram channel ..."

Too bad, Kai's usually more aggressive at taking the piss of stupid IT fads, but most of this vid up to that point has been about configuring a VPS, with what seems to be (fairly sensible?) hardening, so he just quickly breezes through the OpenClaw goofs here. Guess the point being made is that only an idiot would bother securing anything if they turn around and then let OpenClaw on it. But maybe it's too subtle for its own good: you might have missed it if you didn't already know OpenClaw makes syphilitic heartworms look healthy in comparison.

As he had feared, his orders had been forgotten and everyone had brought
the potato salad.