OpenClaw Setup Guide

Secure configuration, 20 productivity use cases with risk assessments, pentester review, and Claude Code comparison.
March 2026 · Based on OpenClaw v2026.3.12+

Table of Contents

  1. Secure & Private Setup Guide
  2. Top 20 Use Cases with Risk Assessments
  3. Risk Summary Matrix
  4. Universal Security Principles
  5. Verification Checklist
  6. Pentester / Whitehat Review
  7. OpenClaw vs Claude Code
  8. Steinberger’s Perspective
About this guide OpenClaw is the fastest-growing open-source project on GitHub (247k+ stars in ~60 days), but its power comes with significant security implications. This guide covers secure setup, the top 20 productivity use cases with detailed risk assessments, and a pentester review of the recommendations.

Part 1: Secure & Private Setup Guide

1.1 Understanding the Architecture

OpenClaw is a long-running Node.js service that connects LLMs (Claude, GPT, DeepSeek, local models) to your local machine and messaging apps (Signal, Telegram, Discord, WhatsApp). Key architectural facts:

1.2 Hardware & Environment Setup

Option A: Dedicated Cloud VPS (Recommended)

Option B: Local Machine (Convenient but higher risk)

Option C: Dedicated Physical Device

1.3 Installation Steps

  1. Create a dedicated non-root user:
    sudo adduser openclaw --disabled-password
    sudo su - openclaw
  2. Install via official script (always verify the script first):
    # Download and review before piping to shell
    curl -fsSL https://get.openclaw.ai -o install.sh
    less install.sh  # REVIEW IT
    bash install.sh
  3. Run the onboarding wizard — it generates a gateway token by default
  4. Immediately run security audit:
    openclaw security audit --fix

1.4 Network Security Hardening

  1. Never expose the Gateway to the public internet directly
  2. Disable mDNS broadcasting:
    export OPENCLAW_DISABLE_BONJOUR=1

    This prevents leaking filesystem paths and hostname info on your local network.

  3. Firewall rules: Block port 18789 from all external access
    sudo ufw deny 18789
  4. Use a reverse proxy with TLS if you must expose it (Caddy or nginx with Let’s Encrypt)

1.5 Authentication & Credential Management

  1. Use strong gateway tokens — the wizard generates one, but verify it’s not weak
  2. Scoped API tokens: For every integration (Gmail, GitHub, etc.), create tokens with minimum required permissions (read-only where possible)
  3. Short-lived credentials over long-lived ones wherever possible
  4. Never store secrets in .env files the agent can read — use a secrets manager or OS keychain
  5. Disable memory storage of secrets: Ensure SOUL.md/MEMORY.md never contain API keys or passwords

1.6 Skill & Supply Chain Security

Critical: ~20% of ClawHub skills are malicious As of Feb 2026, the “ClawHavoc” campaign identified 824+ malicious skills out of 10,700+ on ClawHub.
  1. Audit every skill before installing: Read the SKILL.md and all associated code manually
  2. Only install skills from verified/trusted authors
  3. Never install skills that request exec/shell access unless you’ve audited them thoroughly
  4. Pin skill versions — don’t auto-update
  5. Run openclaw security audit after every skill install
  6. Consider writing your own skills for sensitive workflows rather than trusting third-party ones

1.7 LLM API Key Management

1.8 Ongoing Maintenance

60+ CVEs and 60+ GHSAs in ~4 months Including CVE-2026-28363 (CVSS 9.9) and CVE-2026-25253 (CVSS 8.8). Keep OpenClaw updated.
↑ Back to top

Part 2: Top 20 Use Cases with Risk Assessments

1 Email Triage & Morning Briefing

HIGH RISK 30–45 min/day saved

OpenClaw reads your inbox, summarizes emails by priority, and sends you a digest via Telegram/Signal each morning.

Risks
Mitigations

2 Calendar Management & Scheduling

MEDIUM RISK 15–30 min/day saved

Auto-schedule meetings, detect conflicts, send scheduling links, and provide daily agenda briefings.

Risks
Mitigations

3 Code Review & PR Summaries

MEDIUM RISK 1–2 hrs/day saved

Automatically summarize PRs, flag potential issues, and post review comments on GitHub.

Risks
Mitigations

4 Automated DevOps & Deployment

VERY HIGH RISK 1–3 hrs/day saved

Run test suites, deploy to staging/production, monitor CI/CD pipelines via chat commands.

Risks
Mitigations

5 Meeting Transcription & Action Items

HIGH RISK 30–60 min/meeting saved

Transcribe meeting recordings, extract action items, and email summaries to participants.

Risks
Mitigations

6 Social Media Content & Scheduling

MEDIUM RISK 5–10 hrs/week saved

Generate platform-specific posts from blog content, schedule posts, and manage multiple accounts.

Risks
Mitigations

7 Research & Web Monitoring

LOW-MEDIUM RISK 1–2 hrs/day saved

Monitor specific topics, competitors, or news sources and provide summarized briefings.

Risks
Mitigations

8 Personal Finance Tracking

VERY HIGH RISK 2–3 hrs/week saved

Aggregate bank transactions, categorize spending, generate budget reports.

Risks
Mitigations

9 Customer Support Triage

HIGH RISK 3–5 hrs/day saved

Monitor support channels, categorize issues, draft responses, escalate urgent items.

Risks
Mitigations

10 Document Drafting & Editing

MEDIUM RISK 2–5 hrs/week saved

Draft contracts, proposals, reports from templates and context.

Risks
Mitigations

11 Smart Home Automation

HIGH RISK 15–30 min/day saved

Control lights, thermostats, locks, cameras via natural language through messaging apps.

Risks
Mitigations

12 Expense Report Automation

MEDIUM RISK 2–3 hrs/week saved

Scan receipts, categorize expenses, fill out expense report forms, submit for approval.

Risks
Mitigations

13 Data Entry & Form Filling

MEDIUM RISK 3–5 hrs/week saved

Extract data from PDFs/emails and populate spreadsheets, CRMs, or databases.

Risks
Mitigations

14 Personal Knowledge Base / Second Brain

LOW RISK 1–2 hrs/day saved

Automatically organize notes, bookmarks, highlights into a searchable knowledge base (Notion, Obsidian).

Risks
Mitigations

15 Competitive Intelligence

LOW-MEDIUM RISK 3–5 hrs/week saved

Monitor competitor websites, pricing, job postings, press releases, and social media activity.

Risks
Mitigations

16 Automated Reporting & Dashboards

MEDIUM RISK 3–5 hrs/week saved

Pull data from multiple sources, generate weekly/monthly reports.

Risks
Mitigations

17 Language Translation & Localization

LOW RISK 2–4 hrs/week saved

Translate documents, emails, and content between languages with context awareness.

Risks
Mitigations

18 Automated Testing & QA

MEDIUM RISK 2–4 hrs/day saved

Generate test cases, run test suites, report bugs, and track regression.

Risks
Mitigations

19 Invoice Processing & Accounts Payable

HIGH RISK 5–10 hrs/week saved

Extract data from invoices, match to POs, route for approval, update accounting system.

Risks
Mitigations

20 Personal Health & Fitness Tracking

HIGH RISK 30–60 min/day saved

Aggregate health data from wearables, track habits, generate wellness reports.

Risks
Mitigations
↑ Back to top

Part 3: Risk Summary Matrix

Risk LevelUse Cases
VERY HIGH#4 DevOps/Deployment, #8 Personal Finance
HIGH#1 Email, #5 Meeting Transcription, #9 Customer Support, #11 Smart Home, #19 Invoice Processing, #20 Health Tracking
MEDIUM#2 Calendar, #3 Code Review, #6 Social Media, #10 Documents, #12 Expenses, #13 Data Entry, #16 Reporting, #18 Testing
LOW-MEDIUM#7 Research/Monitoring, #15 Competitive Intel
LOW#14 Knowledge Base, #17 Translation
↑ Back to top

Part 4: Universal Security Principles

  1. Start small: Begin with low-risk use cases (#14, #17, #7) and build confidence
  2. Principle of least privilege: Every integration gets the minimum permissions needed
  3. Human in the loop: Require approval for all write/send/deploy actions initially
  4. Defense in depth: Container + firewall + auth + scoped tokens + monitoring
  5. Assume compromise: Design your setup so that even if the agent is hijacked, the blast radius is limited
  6. Local LLMs for sensitive data: Use Ollama + Llama/Mistral for financial, health, or confidential data
  7. Regular audits: Run openclaw security audit weekly, review memory files monthly
  8. Stay updated: 60+ CVEs in 4 months (including CVSS 9.9) — always run the latest version
  9. Vet all skills: Never install unaudited third-party skills (~20% of ClawHub skills were malicious)
  10. Monitor costs: Set API spending limits to detect exfiltration-via-API-abuse early
↑ Back to top

Part 5: Verification Checklist

After setup, verify security by:

  1. Running openclaw security audit --fix and confirming zero findings
  2. Port scanning your host to confirm 18789 is not externally accessible
  3. Testing that the gateway rejects unauthenticated WebSocket connections
  4. Verifying API key spending limits are set
  5. Confirming mDNS is disabled (OPENCLAW_DISABLE_BONJOUR=1)
  6. Testing a benign prompt injection to see if the agent’s guardrails hold
  7. Reviewing SOUL.md and MEMORY.md for any unexpected content
  8. Verifying allow_url_actions: false in openclaw.yaml to block the one-click RCE vector
  9. Confirming you’re running version 2026.3.12+ (patches all known CVEs)
  10. Testing that WebSocket connections from non-localhost origins are rejected
  11. Verifying Docker container runs as non-root with --cap-drop=ALL and --read-only
↑ Back to top

Part 6: Pentester / Whitehat Review

Upgraded Risk Assessments

Based on the full CVE landscape and real-world attack data, these risk levels should be upgraded:

Use CaseOriginalPentesterJustification
#3 Code ReviewMEDIUMHIGHPrompt injection via PR descriptions is a proven vector; source code exfiltration is high-value
#7 ResearchLOW-MEDMED-HIGHWeb browsing is the #1 indirect prompt injection vector
#14 Knowledge BaseLOWMEDIUMMemory poisoning makes this a persistence vector for attackers

Critical Attack Vectors Missing from Original Guide

1. The “Lethal Trifecta” (Penligent/OctoClaw research)

The combination of System Access + Execution Power + Untrusted Ingestion creates a perfect storm. Most OpenClaw setups have all three by default. Never combine all three in a single agent instance. Use separate agents with different permission levels.

2. Time-Shifted Memory Poisoning (Palo Alto Networks)

Malicious inputs written to SOUL.md/MEMORY.md can appear benign at ingestion but “detonate” later when the agent’s state aligns — logic bomb-style. Palo Alto mapped OpenClaw to every category in the OWASP Top 10 for Agentic Applications.

Mitigation: Treat memory files as code, not data. Use file integrity monitoring (FIM), enforce read-only permissions during runtime, require admin approval for memory file changes.

3. Log Poisoning → Indirect Prompt Injection

Attackers can write malicious content to log files via WebSocket requests. Since the agent reads its own logs, this is an injection vector. Mitigation: Ensure logs are write-only from the agent’s perspective; use a separate log viewer.

4. Container Escape via API

CVE-2026-25253’s WebSocket hijacking works even inside Docker containers — the container boundary doesn’t block it. A containerized install running a vulnerable image is just as exposed as bare-metal.

5. Localhost Trust Assumption (ClawJacked)

OpenClaw’s gateway exempted localhost from rate limiting entirely. Browser JavaScript could brute-force the gateway at hundreds of guesses/second with no lockout and no logging.

Docker Hardening Deep Dive

# docker-compose.yml — hardened OpenClaw deployment
version: '3.8'
services:
  openclaw:
    image: openclaw/openclaw:2026.3.12  # Pin to patched version
    read_only: true                      # Read-only root filesystem
    cap_drop:
      - ALL                              # Drop all Linux capabilities
    security_opt:
      - no-new-privileges:true           # Prevent privilege escalation
      - seccomp=openclaw-seccomp.json    # Custom seccomp profile
    user: "1000:1000"                    # Non-root user
    ports:
      - "127.0.0.1:18789:18789"         # Bind to loopback ONLY
    volumes:
      - ./config:/app/config:ro          # Config read-only
      - ./data:/app/data                 # Data writable (minimal)
    mem_limit: 2g                        # Memory cap
    cpus: 1.0                            # CPU cap
    networks:
      - openclaw-internal

  # Optional: egress proxy to restrict outbound traffic
  egress-proxy:
    image: nginx:alpine
    # Allowlist only LLM API endpoints
    networks:
      - openclaw-internal
      - external

networks:
  openclaw-internal:
    internal: true   # No direct internet access for OpenClaw
  external:
    driver: bridge

Key points:

Incident Response Plan

If you suspect compromise:

  1. Immediately: Disconnect OpenClaw from the network (stop container or kill process)
  2. Within 1 hour: Rotate ALL credentials the agent had access to
  3. Audit: Check logs for unexpected system.run calls; review sandbox list state
  4. Review: Examine SOUL.md/MEMORY.md for injected instructions
  5. Scan: Check for installed backdoor skills or modified skill files
  6. Report: If you find evidence of exploitation, report to OpenClaw security (GitHub Security Advisories)

Pentester Mitigation Ratings by Use Case

Use CaseRatingKey Gap
#1 EmailNEEDS IMPROVEMENTNever open attachments via agent; email is the #1 injection delivery vector
#2 CalendarSUFFICIENT
#3 Code ReviewNEEDS IMPROVEMENTSanitize PR descriptions before LLM processing; use separate browser profile
#4 DevOpsSUFFICIENT
#5 MeetingsSUFFICIENT
#6 Social MediaSUFFICIENT
#7 ResearchNEEDS IMPROVEMENTNever browse in same session as OpenClaw Control UI
#8 FinanceSUFFICIENT
#9 SupportNEEDS IMPROVEMENTRate-limit outgoing responses; implement canary tokens
#10 DocumentsSUFFICIENT
#11 Smart HomeNEEDS IMPROVEMENTShould be VERY HIGH; physical security implications are severe
#12–13SUFFICIENT
#14 Knowledge BaseNEEDS IMPROVEMENTFile integrity monitoring; memory poisoning is a real vector
#15–18SUFFICIENT
#19 InvoicesNEEDS IMPROVEMENTAnomaly detection on invoice amounts; AP workflows are a target
#20 HealthSUFFICIENT

Real-World Scale of the Problem

As of March 2026:

↑ Back to top

Part 7: OpenClaw vs Claude Code

What is Claude Code?

Claude Code is Anthropic’s official CLI and agentic coding tool. It runs in your terminal, IDE (VS Code, JetBrains), and now as a desktop app (Cowork). Unlike OpenClaw’s messaging-app-first approach, Claude Code is purpose-built for software development with deep filesystem and git integration.

New in 2026: Channels & Cowork

Claude Code Channels (launched March 20, 2026): Bridges messaging platforms (Telegram, Discord, Slack) to your Claude Code CLI session. This directly competes with OpenClaw’s core messaging-app model.

Claude Cowork (launched 2026): The desktop agent for knowledge workers. Same agentic architecture as Claude Code but with a desktop interface.

Agent Teams (experimental): Coordinates multiple Claude Code instances working together via CLAUDE_CODE_EXPERIMENTAL_AGENT_TEAMS.

Head-to-Head Comparison

DimensionClaude CodeOpenClaw
Primary interfaceTerminal + IDE + DesktopMessaging apps (Signal, Telegram, WhatsApp, Discord)
Messaging integrationChannels (new March 2026)Native, core architecture
Security modelSandboxed; explicit per-action approvalBroad default permissions; you configure restrictions
Enterprise complianceSOC 2, GDPR, SSO, RBAC, audit trailsNone
CVEs (first 4 months)Managed by Anthropic security60+ CVEs, 60+ GHSAs, CVSS 9.9
LLM flexibilityClaude models onlyAny LLM (Claude, GPT, DeepSeek, Llama, etc.)
Cost~$20/month or API usage-basedFree (MIT) + LLM API costs
Multi-agentAgent Teams (experimental)Single agent with skill integrations
Coding depthPurpose-built, git-nativeGeneral-purpose
Non-coding tasksCowork for knowledge workNative strength (email, calendar, smart home, etc.)
CustomizationCLAUDE.md, hooks, MCP serversSKILL.md, SOUL.md, full source access
Self-hostingNo — Anthropic APIYes — fully on your hardware
Supply chain riskMCP servers (smaller ecosystem)ClawHub (~20% malicious)

When to Use Claude Code

When to Use OpenClaw

The emerging pattern: Use both Many developers run Claude Code as their coding engine and OpenClaw for life/ops orchestration. Claude Code Channels gives you messaging-app access to a coding agent. OpenClaw gives you messaging-app access to a general-purpose agent with system-level access. The security implications of that distinction are enormous.
↑ Back to top

Part 8: Steinberger’s Perspective

Based on Peter Steinberger’s public statements — his blog (Feb 15, 2026), Pragmatic Engineer podcast, Lex Fridman #491, Fortune/TechCrunch/CNBC interviews, and GitHub activity.

His Philosophy: Empowerment, Not Containment

Steinberger positions OpenClaw as “an AI that actually does things” — a revolutionary tool for power users. His vision is building “an agent that even my mum can use.” He frames AI agents as a new skill: “You pick up the guitar — you’re not going to be good at the guitar in the first day.” He calls this approach “agentic engineering” and explicitly distinguishes it from “vibe coding.”

Where Steinberger Would Push Back

  1. The tone is too CISO-like: He’d lead with the empowerment narrative before the risk narrative.
  2. Absolutist “NEVER” prohibitions: He favors graduated trust models over blanket bans. Instead of “NEVER connect door locks,” he’d say “start read-only, level up as you validate.”
  3. The Microsoft quote: He’d note this is Microsoft’s external security team’s view, not universal consensus. His entire pitch is that OpenClaw runs on YOUR machine.
  4. Model interchangeability: A core design principle — route sensitive tasks to local models and mundane tasks to cloud APIs on the same agent.

Where Steinberger Acknowledges the Risks

Uncomfortable Truths

  1. ClawHavoc response was slow: Steinberger was criticized for saying he was “too busy” to address malicious skills. C2 infrastructure stayed operational for days.
  2. Community as security asset: ClawCon drew 1,000+ attendees; Cisco’s DefenseClaw and VirusTotal scanning integration came from community contributions.
  3. One maintainer’s candid warning (Discord): “If you can’t understand how to run a command line, this is far too dangerous of a project for you to use safely.”

The Balanced Take

Steinberger is more optimistic about OpenClaw’s risk-reward tradeoff than the security community. This guide deliberately errs on the side of security researchers (Microsoft, Palo Alto Networks, Cisco). That’s the right call for a security-focused setup guide. But Steinberger’s graduated-trust approach (“start minimal, expand carefully”) is valid for experienced users who understand the risks.

Sources

↑ Back to top