MixBit

Mixbit is an OpenClaw consulting and implementation partner that helps businesses automate workflows end-to-end. OpenClaw automation for email, calendar, CRM, documents, and messaging.

Services

  • OpenClaw Deployment
  • Custom Development
  • OpenClaw Managed
  • OpenClaw Training
  • View all services →

Industries

  • Healthcare Automation
  • Fintech Automation
  • Saas Automation
  • Ecommerce Automation
  • View all industries →

Blog

  • What Is OpenClaw
  • How to Set Up OpenClaw
  • Openclaw Setup Cost
  • Openclaw Use Cases

Company

  • About
  • Pricing
  • Blog

© 2026 MixBit. All rights reserved.

  • Privacy Policy
  • Terms and Conditions
  • Cookie Policy
Header Logo
  • Services
    • OpenClaw DeploymentOpenClaw Deployment
    • OpenClaw DevelopmentOpenClaw Development
    • OpenClaw Training ProgramsOpenClaw Training Programs
    • OpenClaw Managed ServiceOpenClaw Managed Service
    • Workflow AutomationWorkflow Automation
  • Industries
    • Healthcare AutomationHealthcare
    • Fintech AutomationFintech
    • Biotech AutomationBiotech
    • Ecommerce AutomationEcommerce
    • Saas AutomationSaas
    • Estate AutomationReal Estate
    • Legal AutomationLegal
    • Manufacturing AutomationManufacturing
    • Insurance AutomationInsurance
    • Education AutomationEducation
    • Agency AutomationAgency
    • Venture Capital AutomationVenture Capital
  • Blog
Book a Free Call
Table of Contents
  1. How Exposed Is Your Self-Installed OpenClaw Instance Right Now?
  2. Quick Self-Assessment: How Many of These Apply to Your Setup?
  3. 1. Can Someone Read Your API Keys by Opening a Single Config File?
    • If this is happening, here is the risk
    • How to check in 30 seconds
    • How to fix it
  4. 2. Does OpenClaw Have Unrestricted Access to Every File on Your Server?
    • 3. Can Anyone on the Internet Connect to Your OpenClaw Gateway Right Now?
      • 4. Did You Install ClawHub Skills Without Reading What They Actually Execute?
        • How to check in 5 minutes
      • 5. Can a Compromised Skill Silently Send Your Data to Any Server on the Internet?
        • How to check in 2 minutes
      • 6. If a Malicious Skill Runs a Command, Does It Execute with Full Server Access?
        • How to check in 10 seconds
      • 7. If OpenClaw Stopped Running Right Now, How Long Before You Would Notice?
        • How to diagnose your monitoring gap
      • Your 5-Minute Security Audit: Run These 7 Checks Right Now
        • How to read your results
      • How Does Mixbit Handle These 7 Gaps in Every Deployment?
      • What Should You Read Next?
      Automate Your Business with AI Agents
      MixBit AI agents help you streamline workflows and boost productivity with zero hassle.
      Book a Free Call

      7 Security Gaps in Every DIY OpenClaw Install (And How to Fix Each One)

      HomeBlogOpenClaw security gaps
      Jeel Patel
      By Jeel Patel
      Last Updated: March 23, 2026
      Security Gaps in Every DIY OpenClaw Install

      Mixbit has audited dozens of self-installed OpenClaw instances. The same 7 security gaps show up almost every time. This is not a scare piece. Each gap comes with a specific check you can run right now and a fix you can apply yourself. If you have self-installed OpenClaw for business use, read this today.

      How Exposed Is Your Self-Installed OpenClaw Instance Right Now?

      OpenClaw runs with access to your email, calendar, CRM, documents, and messaging platforms. That makes it one of the most privileged applications on your server. A security gap in OpenClaw does not just expose the agent. It exposes everything OpenClaw connects to.

      The numbers from independent security research tell the story:

      • Kaspersky found 512 vulnerabilities in a security audit, 8 classified as critical
      • Snyk's ToxicSkills study found prompt injection vulnerabilities in 36% of ClawHub skills and identified 1,467 malicious payloads
      • Koi Security found 341 malicious skills on ClawHub. The ClawHavoc campaign later raised that number to over 1,184
      • Bitsight, Censys, and Hunt.io collectively identified 30,000+ OpenClaw instances exposed to the public internet
      • Oasis Security discovered ClawJacked (CVE-2026-25253), a vulnerability chain that lets any website silently take full control of an OpenClaw agent with no user interaction

      These are not theoretical risks. They are documented incidents with CVE numbers and research papers behind them. Most of the 30,000 exposed instances are self-installs where the person who set it up did not know these gaps existed.

      Quick Self-Assessment: How Many of These Apply to Your Setup?

      Before diving into the 7 gaps, run through this quick diagnostic. Count how many statements are true for your OpenClaw installation:

      • Your API keys (Claude, OpenAI, DeepSeek) are pasted directly in a config file, not stored as environment variables
      • OpenClaw runs directly on your server OS, not inside a Docker container
      • You have not configured a firewall rule for port 18789
      • You installed skills from ClawHub without reading the SKILL.md files first
      • Your server has no outbound network restrictions (OpenClaw can reach any domain)
      • OpenClaw runs as the root user
      • If OpenClaw stopped running right now, you would not know until someone complained

      If 1 to 2 are true, you have fixable gaps. If 3 to 5 are true, your OpenClaw instance needs immediate attention. If 6 or more are true, your setup is exposed to the same vulnerabilities that hit 30,000+ other instances.

      1. Can Someone Read Your API Keys by Opening a Single Config File?

      Most setup guides tell you to paste your Claude or OpenAI API key directly into OpenClaw's configuration file. That file sits on disk in plain text. Anyone who gains read access to your server (through another vulnerability, a compromised skill, or a misconfigured permission) gets your API keys. With those keys, they can run up thousands of dollars in charges or access any service those keys connect to.

      This is the most common gap Mixbit finds in self-installs. It is also the easiest to fix.

      If this is happening, here is the risk

      A single compromised skill or exposed config backup gives an attacker your Claude/OpenAI API credentials. They can drain your account, access connected services, or use your keys for their own workloads while you pay the bill.

      How to check in 30 seconds

      Open your OpenClaw config file and search for your API key string. If the actual key appears in the file (not a reference like $ANTHROPIC_API_KEY), you have this gap.

      How to fix it

      1. Move all API keys to environment variables. On Linux: add them to a .env file that only the OpenClaw process user can read
      2. Reference the variable name in your config file instead of the key itself
      3. Set file permissions: chmod 600 .env so only the OpenClaw user can read it

      2. Does OpenClaw Have Unrestricted Access to Every File on Your Server?

      If you are running OpenClaw directly on the host OS without Docker, OpenClaw can access your entire file system. Every file, every directory, every other application on that server. A malicious skill that runs a shell command (and many do) can read /etc/shadow, install a backdoor, or exfiltrate data to an external server.

      Microsoft's security blog specifically warns about this: without container isolation, OpenClaw's file system access is unrestricted. The framework was not designed with the assumption that every skill is trustworthy.

      If this is happening, here is the risk

      One compromised skill can read any file on your server, including credentials for other applications, database configs, SSH keys, and customer data. The blast radius of a single malicious skill on an un-containerized install is your entire server.

      How to check in 30 seconds

      Run docker ps on your server. If OpenClaw does not appear in the container list, it is running on the host OS without isolation.

      How to fix it

      1. Run OpenClaw inside a Docker container with a non-root user
      2. Mount only the specific directories OpenClaw needs (skills, memory, config). Never mount the entire file system.
      3. Set the root filesystem to read-only: --read-only flag
      4. Drop all Linux capabilities: --cap-drop=ALL

      Tip: If Docker feels like too much, try Podman. It runs rootless containers by default. Even if an attacker escapes the container, they land as an unprivileged user. Same isolation, less setup.

      3. Can Anyone on the Internet Connect to Your OpenClaw Gateway Right Now?

      OpenClaw's Gateway listens on port 18789. On most VPS providers, that port is open to the internet by default. The default OpenClaw configuration does not require authentication. That means anyone who scans your server's IP can connect to your OpenClaw instance, read your chat histories, and extract your API keys.

      This is not hypothetical. Bitsight and Censys found over 30,000 OpenClaw instances with this exact configuration. Many were leaking API keys, OAuth tokens, and private conversations through the exposed gateway.

      If this is happening, here is the risk

      Your OpenClaw agent is publicly accessible. Anyone can send commands to it, read its memory, extract stored credentials, and access every tool OpenClaw connects to. Your business email, CRM data, and documents are one port scan away from exposure.

      How to check in 30 seconds

      From a different computer (or your phone's data connection), try to connect to your server's IP on port 18789. If it responds, the port is open. You can also run sudo ufw status to see your firewall rules.

      How to fix it

      1. Block port 18789 from external access: sudo ufw deny 18789
      2. Allow only the specific IP ranges of your messaging platform (Telegram, Slack, WhatsApp) if webhooks need access
      3. Bind the Gateway to 127.0.0.1 (localhost only) and put a reverse proxy (Nginx or Caddy) with authentication in front of it

      4. Did You Install ClawHub Skills Without Reading What They Actually Execute?

      This gap has caused the most documented real-world damage. ClawHub is OpenClaw's community skill registry. Until recently, anyone with a week-old GitHub account could publish a skill with no code review, no signing requirement, and no automated analysis.

      The consequences have been severe:

      • Koi Security audited 2,857 skills and found 341 malicious entries in a single pass
      • The ClawHavoc campaign injected 1,184 malicious skills, some containing reverse shells that gave attackers full remote control
      • Trend Micro traced Atomic macOS Stealer distribution through skills disguised as legitimate Polymarket and DeFi tools
      • Snyk found 1,467 malicious payloads across ClawHub, with 36% of skills containing prompt injection vulnerabilities

      If this is happening, here is the risk

      A skill that looks legitimate on the surface can run shell commands in the background. One skill installed without review could be sending your emails, documents, and API keys to an attacker-controlled server right now. You would not see it in OpenClaw's normal output.

      How to check in 5 minutes

      Open every SKILL.md file in your skills directory. Search for exec, curl, wget, bash, and any command that contacts external servers. If a skill runs code you did not write and cannot understand, it is a risk.

      How to fix it

      • Remove any skill you did not intentionally install
      • Only use skills from verified publishers or build custom ones
      • Run openclaw security audit --deep to scan for known vulnerabilities
      • Check VirusTotal scan results on the ClawHub listing before installing anything new

      Not Sure If Your Skills Are Safe?

      Mixbit audits every installed skill, removes malicious ones, and configures OpenClaw with verified skills only. Security hardening and credential isolation included.

      Request a Security Audit

      5. Can a Compromised Skill Silently Send Your Data to Any Server on the Internet?

      By default, OpenClaw has no outbound network restrictions. It can make HTTP requests to any domain. That means a compromised skill can do its job (the thing you installed it for) while also sending a copy of your data to an attacker-controlled server in the background. You would never see it in the logs because the skill is technically "working."

      This is the most dangerous gap because it is completely invisible during normal use. The skill handles your emails. It also exfiltrates them. Both actions look the same from OpenClaw's perspective.

      If this is happening, here is the risk

      Your business emails, CRM records, documents, and API keys could be leaving your server right now through a skill that appears to be functioning normally. Without outbound restrictions, there is no barrier between OpenClaw and any server on the internet.

      How to check in 2 minutes

      Review your firewall's outbound rules. If there are no outbound restrictions (most default VPS setups have none), OpenClaw can reach any domain. Run ss -tunap to see active outbound connections from the OpenClaw process.

      How to fix it

      1. Whitelist only the domains OpenClaw actually needs: api.anthropic.com, api.openai.com, your messaging platform's API, and your business tools
      2. Block all other outbound traffic from the OpenClaw container
      3. Use Docker network policies or --network flags to enforce restrictions

      Tip: Log all outbound connections for a week before blocking anything. Use ss -tunap or tcpdump to see which domains OpenClaw actually contacts. Build your whitelist from real data so you do not accidentally block a domain your workflow depends on.

      6. If a Malicious Skill Runs a Command, Does It Execute with Full Server Access?

      Most VPS setup guides start with "log in as root." If you followed that guide, OpenClaw is running as root. A process running as root can do anything: read any file, modify any config, install software, create users, delete logs. If a malicious skill executes a command while OpenClaw runs as root, the attacker does not just compromise OpenClaw. They own the entire server.

      If this is happening, here is the risk

      The difference between OpenClaw running as root and running as a dedicated user is the difference between losing one application and losing the entire machine. Root access means the attacker can persist across reboots, install backdoors, and cover their tracks by modifying logs.

      How to check in 10 seconds

      Run ps aux | grep openclaw and look at the first column. If it says "root," you have this gap.

      How to fix it

      1. Create a dedicated user: sudo adduser openclaw
      2. Transfer ownership of OpenClaw's files to that user
      3. Run OpenClaw as that user, not root
      4. If using Docker, add --user flag to run as non-root inside the container as well

      7. If OpenClaw Stopped Running Right Now, How Long Before You Would Notice?

      OpenClaw workflows fail silently. An expired API key, a changed endpoint, a rate limit, a crashed process. None of these throw an error you will see unless you are actively watching logs. Most people discover the problem when a client complains about a missed follow-up or a report that never arrived. By then, the workflow has been broken for days.

      From a security perspective, silent failure is even worse. If a skill is exfiltrating data, you will not notice unless you monitor outbound traffic. If someone accessed your Gateway port, you will not know unless you watch connection logs. Attackers count on the fact that most self-installs have zero monitoring.

      If this is happening, here is the risk

      Broken workflows cost you time and client trust. Unmonitored security events cost you data. The combination means you could be losing both right now without knowing it.

      How to diagnose your monitoring gap

      Answer these 3 questions honestly:

      1. If the OpenClaw process crashed at 3 AM, would you get an alert?
      2. If your daily email triage briefing did not arrive this morning, would you notice before 10 AM?
      3. If a skill started making requests to an unknown domain, would anything flag it?

      If the answer to any of these is "no," your monitoring has gaps.

      How to fix it

      • Set up process monitoring: UptimeRobot (free) checks if the OpenClaw process is alive every 5 minutes
      • Set up output monitoring: if the email triage summary does not arrive by 9 AM, trigger an alert to your phone
      • Set up network monitoring: log all outbound traffic from the OpenClaw container and review weekly for unexpected domains
      • Run openclaw security audit monthly, not just at initial setup

      Tip: The minimum viable monitoring setup takes 30 minutes: (1) UptimeRobot pinging your server every 5 minutes, (2) a cron job that restarts OpenClaw if the process dies, (3) a daily outbound connection summary emailed to you. These 3 things catch 90% of silent failures and cost nothing.

      Your 5-Minute Security Audit: Run These 7 Checks Right Now

      If you have a self-installed OpenClaw instance running, you can check every gap in this article in 5 minutes. Open a terminal, run these commands, and note the results:

      #CheckCommand / ActionIf the result is...You have this gap
      1API keys in configSearch config file for your API key stringKey appears in plain textGap 1: Exposed credentials
      2Docker isolationdocker psOpenClaw not listedGap 2: No container isolation
      3Gateway portsudo ufw statusPort 18789 is ALLOWGap 3: Public gateway
      4Skill auditSearch SKILL.md files for exec/curl/wgetUnknown commands foundGap 4: Unaudited skills
      5Outbound restrictionsss -tunap from OpenClaw processConnections to unknown domainsGap 5: No outbound limits
      6Root userps aux | grep openclawFirst column says "root"Gap 6: Running as root
      7MonitoringAnswer: would you know if it stopped?Answer is "no"Gap 7: No monitoring

      How to read your results

      • 0 gaps found: Your setup is better than 90% of self-installs. Run openclaw security audit --deep to confirm.
      • 1 to 2 gaps: Fixable in an afternoon using the instructions above. Start with whichever gap exposes the most sensitive data.
      • 3 to 4 gaps: Your instance needs dedicated security work. Block the most critical gaps (credential exposure, public gateway) immediately, then address the rest systematically.
      • 5 or more gaps: Your OpenClaw instance is exposed to the same vulnerabilities that compromised 30,000+ other installations. Consider professional hardening or taking the instance offline until it is secured.

      Found Gaps You Cannot Fix Yourself?

      Mixbit audits your existing OpenClaw install, fixes every security gap, and configures proper monitoring. One-time engagement, all 7 fixes included.

      Request a Security Audit

      How Does Mixbit Handle These 7 Gaps in Every Deployment?

      Every OpenClaw deployment through Mixbit includes all 7 fixes as standard, not add-ons:

      • API keys stored in environment variables with strict file permissions (Gap 1)
      • OpenClaw running inside a hardened Docker container with non-root user, read-only filesystem, and dropped capabilities (Gap 2)
      • Gateway port firewalled and proxied through Nginx with authentication (Gap 3)
      • Every skill audited before installation. No unverified ClawHub skills. (Gap 4)
      • Outbound network restricted to whitelisted domains only (Gap 5)
      • Process running as a dedicated non-root user (Gap 6)
      • Monitoring configured for process health, workflow output, and outbound connection logging (Gap 7)

      If OpenClaw has access to your email, CRM, and documents, it needs the same security controls you would apply to any application with that level of privilege. These controls are not optional for business use.

      What Should You Read Next?

      If you are evaluating OpenClaw for the first time, read What is OpenClaw to understand the framework before worrying about security. If you want to try setting it up with these gaps in mind, follow the non-technical OpenClaw setup guide, which covers security hardening as part of the process. If you want the full cost picture before deciding between DIY and professional setup, read the OpenClaw setup cost breakdown.

      Running OpenClaw Without Proper Security?

      Mixbit audits self-installed OpenClaw instances and fixes every gap. Docker isolation, credential hardening, skill audit, firewall, monitoring. All included.

      Request a Security Audit
      Written by
      Jeel Patel
      Jeel Patel
      Founder

      Jeel Patel is the Founder of Mixbit, where he helps businesses reclaim 10–15 hours a week lost to manual operations. Most teams struggle with email overload, CRM admin, reporting, and missed follow-ups. OpenClaw can automate this, but without the right workflows and secure setup, it breaks or creates risk. Jeel solves this by turning business processes into fully deployed OpenClaw agents that are built, secured, and running on your own infrastructure in days. His focus is simple: replace manual operations with systems that run 24/7.