Is OpenClaw safe?
What you control when self-hosting—and a practical checklist before going live
What you control when self-hosting—and a practical checklist before going live
Page scope: Trust and risk overview for new operators—not the production hardening checklist. For deploy-time settings use Security hardening; for a guided pass use the hardening walkthrough.
Short answer: OpenClaw is as safe as you configure it. The project ships sensible defaults (DM pairing, local Gateway binding in many setups), but an agent with shell, browser, and skills is powerful. Treat it like a small server that can read files and call APIs—not like a read-only chatbot.
This page explains real risks and concrete fixes. For step-by-step hardening, use the hardening checklist and walkthrough. Official advisories: GitHub Security.
OpenClaw sits between untrusted input (anyone who can DM your bot) and trusted capabilities (your disk, APIs, calendar, shell). Security is about narrowing that gap:
| Risk | What happens | What to do |
|---|---|---|
| Open DMs | Strangers send prompts; prompt injection, spam, cost burn | Keep dmPolicy: "pairing"; use allowFrom (pairing guide) |
| Exposed Gateway | Anyone on the internet drives your agent | Bind localhost or private IP; token auth; TLS via reverse proxy |
| Malicious skills | Skill scripts exfiltrate keys or run shell | Safe install guide; read SKILL.md; sandbox |
| Over-powered tools | Agent deletes files or sends email you did not intend | Limit tools per channel; confirm destructive actions in prompts |
| Leaked API keys | Keys in chat logs, backups, or world-readable config | File permissions; env vars; rotate keys; audit config paths |
openclaw security audit --deep and fix critical items (use --fix where safe).none if the process is reachable beyond localhost.~/.openclaw/ but treat backups as sensitive (they contain tokens).Detailed items: Security hardening checklist.
Consider a different architecture if you need:
For minimal footprint and stricter defaults, some teams evaluate ZeroClaw on edge hardware—different tradeoffs, not automatically safer without configuration.
Is OpenClaw safe for WhatsApp personal use? Yes, for many people, if you use pairing, do not expose the Gateway publicly, and avoid installing random skills. See WhatsApp setup.
Did OpenClaw have security issues? Like any active project, advisories exist—check GitHub Security Advisories and keep versions current (upgrading).
Is my data sent to the model provider? Messages and tool output go to whichever LLM provider you configure. Read their data policies; use local models (Ollama) if you need on-prem inference.