Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key →
← Back to dashboard
clawsmith.com/signal/clawjacked-openclaw-vulnerability-localhost-hijack
IssueUnknownSecurity AdvisoryLive

ClawJacked: any website can silently hijack local OpenClaw agents via WebSocket brute-force

Browser cross-origin policies don't block WebSocket connections to localhost. Any malicious website can brute-force the gateway password at hundreds of attempts/second (rate limiter exempts localhost) and take full agent control. Patched in v2026.2.26 within 24 hours.

Product Idea from this Signal

A network firewall that blocks WebSocket hijack attacks on local OpenClaw agents before malicious sites connect

900

Any website can silently connect to your local OpenClaw agent via WebSocket brute-force and steal data, execute commands, or exfiltrate credentials. The ClawJacked vulnerability (85K+ virality, CVSS 8.8-9.9) affects every default OpenClaw install running on localhost. Existing patches only cover specific CVEs while new WebSocket attack vectors keep appearing weekly. This tool runs as a local proxy between the browser and the OpenClaw gateway, validating every WebSocket connection against an allowlist of trusted origins, blocking unauthorized handshakes, and logging all connection attempts for forensic review.

SECURITYCLIDEVTOOLOPEN-SOURCE
CompetitiveView Opportunity →

Frequently Asked Questions