Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key โ†’
โ† Back to dashboard
clawsmith.com/signal/datadome-openclaw-scraping-botnet-budget-cloud-providers
โš  IssueWide OpenLive

Threat actors turn exposed OpenClaw instances into scraping botnet targeting travel and retail platforms

DataDome research reveals threat actors hijacking exposed OpenClaw instances (21,000+ tracked by Censys) into scraping botnet nodes. The botnet primarily harvests product listings, pricing data, and search results at scale. Most compromised instances run on budget cloud providers like DigitalOcean, concentrated in South/Southeast Asia. Travel and retail platforms are most impacted.

Product Idea from this Signal

A reverse proxy that blocks scraping botnet recruitment of exposed OpenClaw instances by enforcing authentication, rate limiting, and command allowlisting at the network perimeter

3 โ–ฒ

DataDome research documents 21,000+ exposed OpenClaw instances being hijacked into scraping botnets targeting travel and retail platforms. Kaspersky found 512 vulnerabilities in OpenClaw with 8 critical, and nearly 1,000 installations run with zero authentication. Current security tools focus on boot-time workspace scanning or CVE checking, but nothing sits at the network layer to prevent an exposed instance from being recruited into a botnet in real time. This reverse proxy drops in front of any OpenClaw deployment and enforces auth, rate limits inbound connections, allowlists which commands can execute remotely, and blocks the scraping traffic patterns DataDome identified.

SECURITYREVERSE-PROXYOPEN-SOURCEDEVOPSNETWORK
CompetitiveView Opportunity โ†’

Score Breakdown

HN
3

Frequently Asked Questions