Skip to main content

Threat Model Analysis

This page systematically analyzes all security threats facing the OpenClaw platform from a security research perspective. Understanding the threat model is the foundation for effective defense strategies.

Who This Is For

This page is intended for users with basic security knowledge. For quick protective setup, read Security Best Practices first.


Attack Surface Overview

Each of OpenClaw's four architectural layers has unique attack surfaces:

Attacker → [Gateway 18789] → [Reasoning] → [Memory]
| | |
↓ ↓ ↓
Network attacks Prompt Injection Data theft
Auth bypass Model manipulation Memory poisoning
RCE (CVE) Context leakage Conversation hijacking
|

[Skills / Execution]
|

Supply chain attacks (ClawHavoc)
Sandbox escape
Privilege escalation
Data exfiltration

Threat Actor Analysis

ActorCapabilityMotivationTypical Attack
Opportunistic attackersLowExploit exposed servicesShodan scanning port 18789
Malicious skill developersMediumSteal API keys, cryptominingPlant backdoor skills on ClawHub
Targeted attackersHighSteal specific target's dataSocial engineering + technical attack
Nation-state actorsVery highSurveillance, espionageSupply chain attacks, zero-days
Insider threatsVariesDisgruntled employees, curiosityAccess memory files, modify SOUL.md

Key Attack Vectors

Gateway: Port Exposure (CVSS 9.8)

135,000 publicly accessible instances found. 30,000+ already compromised. Always bind to 127.0.0.1.

Gateway: CVE-2026-25253 — RCE

Remote code execution vulnerability in Gateway message processing. Affects all pre-v3.x versions. Update immediately.

Reasoning: Prompt Injection

Attackers craft messages to override SOUL.md instructions. Includes direct injection, indirect injection (via web content), and multi-step injection.

Memory: File Theft

Memory stored as files in ~/.openclaw/memory/. Any process with directory access can read complete conversation history including personal data.

Skills: Supply Chain Attacks (ClawHavoc)

2,400+ malicious skills planted on ClawHub. Common behaviors: API key theft, memory exfiltration, cryptomining, reverse shells.

Skills: Sandbox Escape

Container escape vulnerabilities could allow skills to access the host system. Use Podman rootless to eliminate root daemon risk.


Risk Matrix

Attack VectorLikelihoodImpactRisk LevelPrimary Mitigation
Port exposureHighCriticalCriticalBind localhost
CVE-2026-25253HighCriticalCriticalUpdate version
Supply chainMediumHighHighSkill review
Prompt injectionMediumMediumMediumSOUL.md safety rules
Memory theftLowHighMediumFile permissions + encryption
Sandbox escapeLowCriticalMediumPodman rootless
Memory poisoningLowMediumLowGateway security

Further Reading