There's a lot of talk about how unsecured OpenClaw is, but lets start with the facts. Any system, app or internet connected device camera will suffer from the same issues. The first step is to ensure you have a good password and rotate it every 90 days, always apply and run the latest version of the code. An the last but one of the most important thing is to run the vendors audit tools. In case of OpenClaw, here are the commands you need to run:
openclaw security audit
openclaw security audit --deep
openclaw security audit --fix
openclaw security audit --json
Here's a copy of an audit I ran today using the openclaw security audit
Summary:
* 0 Critical Findings: Excellent! No major vulnerabilities detected.
* 1 Warning: gateway.trusted_proxies_missing
* 1 Info: summary.attack_surface (Minimal attack surface = positive!)
Key Details:
* Attack Surface: Groups: open=0, allowlist=1 (This is really good – a very tight, protected surface.)
* Elevated Tools: Enabled (Use with caution as per best practices!)
* Webhooks: Disabled (A good security stance if they're not actively used.)
* Internal Hooks: Enabled (Standard for OpenClaw operation.)
* Browser Control: Enabled
Overall Assessment:
Your OpenClaw security posture is strong, especially for local use. The gateway.trusted_proxies_missing warning is noted, but it's primarily a reminder for when you might expose the Control UI via a reverse proxy. For our current local setups, it doesn't pose an immediate risk.