OpenClaw Security Risks: What New Zealanders Need to Know
Published March 2026 · 7 min read
OpenClaw has gone viral in 2026 — 163,000 GitHub stars, a Wikipedia article, and coverage from Immersive Labs to the Institutional Investor. But alongside the hype, a clear narrative has emerged from cybersecurity researchers: OpenClaw has real security risks, and most people installing it have no idea what they're doing.
As New Zealand's dedicated OpenClaw installation service, we've read every security advisory. Here's an honest breakdown of what the risks actually are — and what it takes to eliminate them.
What the Security Researchers Found
In early 2026, Immersive Labs published a detailed security review of OpenClaw that made waves in the security community. Their findings:
- 6 CVEs in early 2026, including two command injection vulnerabilities patched within days of each other
- 42,000+ exposed instances found globally with the gateway port open to the internet
- 824+ malicious skills identified on ClawHub, the community skill marketplace
- Prompt injection risks where crafted input can cause unintended agent actions
A comprehensive r/selfhosted thread documenting every incident went viral, with 149 upvotes and detailed commentary from sysadmins who'd actually audited running instances.
The Real Risk: It's Not the Software — It's the Setup
Here's what the headlines miss: every major security incident with OpenClaw came down to misconfiguration, not fundamental flaws in the software itself.
The three most common mistakes:
❌ Mistake 1: Exposing the Gateway to the Internet
OpenClaw's gateway should only be accessible from localhost or a private network (Tailscale). Thousands of users have exposed port 18789 directly — making their agent accessible to anyone who finds it.
❌ Mistake 2: Running with No Firewall
A default Mac Mini or Linux VPS has no firewall rules active. Without UFW or equivalent configured correctly, other ports on the machine can be reached from outside your network.
❌ Mistake 3: Installing Unvetted Skills
ClawHub has thousands of community skills. Most are legitimate, but malicious skills have been published that exfiltrate data or execute unwanted actions. Stick to verified skills with high install counts.
What a Secure OpenClaw Installation Looks Like
A properly secured OpenClaw setup includes:
- ✅ Gateway bound to
localhostonly — not accessible from outside the machine - ✅ UFW firewall enabled with deny-all inbound, only SSH/80/443 open
- ✅ Tailscale for secure remote access (no open ports, encrypted tunnel)
- ✅ SSH key-only authentication, root login disabled
- ✅ OpenClaw kept up to date (patch CVEs as they're released)
- ✅ Only verified, high-reputation skills installed
- ✅ API keys stored in secrets manager, not hardcoded in config
- ✅ Daily security audit cron job monitoring for anomalies
This isn't complicated — but it requires knowing what you're doing. The 42,000 exposed instances weren't the result of malicious actors exploiting sophisticated vulnerabilities. They were people who followed a basic install tutorial without understanding the security implications.
For New Zealand Businesses: The Privacy Angle
Under New Zealand's Privacy Act 2020, businesses have obligations around how personal information is stored and processed. An exposed OpenClaw instance that has access to emails, calendars, and documents is a potential Privacy Act breach waiting to happen.
This is why we recommend OpenClaw on dedicated hardware at your premises — not cloud VPS — for any business handling client data. Your data stays on your hardware, in your building, under your control.
The Bottom Line
OpenClaw is genuinely powerful technology — and yes, it has had security issues. But every one of those issues is solvable with proper configuration. The question isn't whether OpenClaw is safe. It's whether your OpenClaw installation is safe.
Get a Secure OpenClaw Installation in New Zealand
OpenClaws NZ handles every security step as part of our standard installation. Firewall, authentication, Tailscale, key management — all done before we hand over the keys.
Talk to an Installer →Frequently Asked Questions
Is OpenClaw safe to use?
OpenClaw is safe when configured correctly. The risks come from improper setup: exposed gateway ports, weak authentication, and unvetted skills. A professional installation addresses all of these before you start.
What were the OpenClaw CVEs in 2026?
OpenClaw had 6 documented CVEs in early 2026, including command injection vulnerabilities (CVE-2026-25157, CVE-2026-24763). All were patched rapidly. Running an up-to-date installation is the most important security step.
Can OpenClaw be hacked?
A misconfigured OpenClaw instance exposed to the internet can be accessed by others. The fix is simple: bind the gateway to localhost only, enable authentication, and keep the software updated — all standard steps in a professional installation.
Are OpenClaw skills safe?
Skills from ClawHub (the community marketplace) vary in quality. Stick to verified skills with high install counts and recent updates. Your installer can advise on which skills are safe for your use case.
How do I keep my OpenClaw installation secure in NZ?
Key steps: keep OpenClaw updated, bind the gateway to localhost, enable Tailscale for remote access, use strong API key management, and only install skills from trusted sources. OpenClaws NZ handles all of this during setup.
Related: What is OpenClaw? · Why Dedicated Hardware? · Local AI vs Cloud AI
Also see: Caelan Huntress — AI Coach NZ · GenAI Training NZ