OpenClaw: What is it and can you use it safely?
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在一百个字以内,而且不需要以“文章内容总结”或“这篇文章”这样的开头,直接写描述即可。好的,我先仔细阅读一下这篇文章。 文章主要讲的是一个叫做OpenClaw的开源AI工具,它最近引起了很多关注,甚至有人声称它具备机器意识。文章详细介绍了OpenClaw的功能、开发过程中的问题以及安全风险。 首先,OpenClaw是在2025年11月发布的,是一个可以在本地运行的自主AI代理。它可以管理任务、与应用程序交互、读写文件,并作为个人数字助手集成到聊天应用中,自动化邮件、日历扫描和网络搜索等功能。 然后,文章提到OpenClaw之前的名字是ClawdBot,但因为与Anthropic公司的工具“Claude”名称冲突而改名为Moltbot。然而,这个改名导致了网络犯罪分子的模仿攻击,影响了其声誉。 接着,文章讨论了另一个安全问题:Hudson Rock发表了一篇文章,指出有恶意软件窃取了OpenClaw的完整配置信息,相当于盗取了AI代理的身份信息。这不仅对OpenClaw构成威胁,也对其他AI代理构成了潜在风险。 此外,文章还提到对手开始在供应链层面攻击AI系统,通过污染训练数据或植入后门来破坏系统安全。OpenClaw作为一个开源项目,在快速发展的同时缺乏完善的安全模型。 最后,文章给出了一些使用OpenClaw的安全建议,包括运行在沙盒环境中、限制权限、监控行为等,并强调了安全的重要性。 现在我需要将这些内容浓缩到100字以内。重点包括:OpenClaw的功能、改名引发的问题、安全漏洞、供应链攻击风险以及安全建议。 可能的总结结构:介绍工具及其功能 → 改名问题 → 安全漏洞和供应链风险 → 使用建议和警告。 确保语言简洁明了,并且不使用任何开头语。 </think> OpenClaw是一款开源AI工具,在本地运行并能管理任务和集成聊天应用。因名称争议改名后遭遇网络攻击和声誉损失。研究发现其配置易被恶意软件窃取,并面临供应链攻击风险。专家建议谨慎使用并采取严格安全措施。 2026-2-23 21:10:50 Author: www.malwarebytes.com(查看原文) 阅读量:10 收藏

An AI tool with a funny name has caused quite a commotion as of late—including some allegations of machine consciousness—so here is a breakdown on OpenClaw.

Launched in November 2025, OpenClaw is an open-source, autonomous artificial intelligence (AI) agent that was made to run locally on your own computer, allowing it to manage tasks, interact with applications, and read and write files directly. It acts as a personal digital assistant, integrating with chat apps like WhatsApp and Discord to automate emails, scan calendars, and browse the internet for information. 

OpenClaw was formerly known as ClawdBot, but the project brushed up against the large AI developer Anthropic, because of its own tool named “Claude.” In response, OpenClaw’s developer quickly renamed the project to “Moltbot,” which brought impersonation campaigns from cybercriminals. The trademark trouble and the abuse that followed put a dent in OpenClaw’s reputation.

Another dent followed when Hudson Rock published an article about the first observed case of an infostealer grabbing a complete OpenClaw configuration from an infected system, effectively looting the “identity” of a personal AI agent rather than just browser passwords.

The case underlines an impending danger—and not just for OpenClaw, but for other AI agents as well. Infostealers are starting to harvest not just credentials but entire AI personas plus their cryptographic “skeleton keys,” turning one compromised agent into a pivot point for full‑blown account takeover and long‑term profiling.

As I stated before in a broader context, adversaries are starting to target AI systems at the supply‑chain level, quietly poisoning training data and inserting backdoors that only surface under specific conditions. OpenClaw sits squarely in this emerging risk zone: open source, moving fast, and increasingly wired into mailboxes, cloud drives, and business workflows while its security model is still being improvised.

At this stage of its development, treating OpenClaw as a hardened productivity tool is wishful thinking, since it behaves more like an over‑eager intern with an adventurous nature, a long memory, and no real understanding of what should stay private.

Researchers and regulators have already documented prompt injection risks, log poisoning, and exposed instances that hand attackers plaintext credentials or tokens via poisoned emails, websites, or logs that the agent dutifully processes.

How to use OpenClaw safely

For anyone thinking about using OpenClaw in production, the bigger picture is even less comforting. OpenClaw runs locally but is designed to be adventurous: it can browse, run shell commands, read and write files, and chain “skills” together without a human checking every step. Misconfigured permissions, over‑privileged skills, and a culture of “just give it access so it can help” mean the agent often sits at the center of your accounts, tokens, and documents, with very few guardrails.

In fact, an employee at Meta who works in AI safety and alignment recently shared on the social media platform X that she was unable to prevent ClawBot from deleting a major portion of her email inbox.

Further, the Dutch data protection authority (Autoriteit Persoonsgegevens) warned organizations not to deploy experimental agents like OpenClaw on systems that handle sensitive or regulated data at all, flagging the combination of privileged local access, immature security engineering, and a rapidly growing ecosystem of dubious third‑party plugins as a kind of Trojan horse on the endpoint.

Microsoft provided a list of recommendations in this field that make a lot of sense. They are not specifically aimed at OpenClaw, but provide a conservative baseline for self‑hosted, Internet‑connected agents with durable credentials. (If these recommendations feel overly technical, it’s because safely using an AI agent with broad access is still an experimental and technical process.)

  •  Run OpenClaw (or similar agents) in a sandboxed VM or container on isolated hosts, with default‑deny egress and tightly scoped allow‑lists.
  • Give the runtime its own non‑human service identities, least privilege, short token lifetimes, and no direct access to production secrets or sensitive data.
  • Treat skill/extension installation as introducing new code into a privileged environment: restrict registries, validate provenance, and monitor for rare or newly seen skills.
  • Log and periodically review agent memory/state and behavior for durable instruction changes, especially after ingesting untrusted content or shared feeds.
  • Understand and provide for the event where you may need to nuke‑and‑pave: keep non‑sensitive state snapshots handy, document a rebuild and credential‑rotation playbook, and rehearse it.
  • Run an up to date real-time anti-malware solution that can detect information stealers and other malware.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/02/openclaw-what-is-it-and-can-you-use-it-safely
如有侵权请联系:admin#unsafe.sh