Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key →
← Back to dashboard
clawsmith.com/signal/openclaw-hacking-groups-30k-compromised-api-key-malware
IssueWide OpenLive

Multiple Hacking Groups Exploit 30K+ OpenClaw Instances to Steal API Keys and Deploy Malware

Flare analysts observed over 30,000 compromised OpenClaw instances used to steal API keys, intercept messages, and distribute info-stealing malware. 63% of exposed instances operate without authentication. Active campaigns detected since January 2026.

Product Idea from this Signal

A CI/CD security gate that blocks OpenClaw deployments failing CVE, config, and network exposure checks

892

OpenClaw has accumulated 138+ CVEs in under 3 months, with 220,000+ instances exposed to the internet and 63% running without authentication. Kaspersky declared it unsafe for use. Existing tools (SecureClaw, Carapace, ClawSec) run audits after deployment, but nothing blocks a bad deployment from going live. This is a pre-deploy security gate that integrates into CI/CD pipelines, runs automated CVE version checks, config hardening validation, and network exposure scans, and fails the deploy if the instance doesn't meet a configurable security baseline.

CLICI-CDSECURITYDEVOPSOPEN-SOURCE
CompetitiveView Opportunity →

Frequently Asked Questions