So that you put in OpenClaw
OpenClaw turns into highly effective the second it could join a mannequin to instruments, expertise, MCP servers, and a stay workspace. That can be the second safety stops being optionally available.
In case you are evaluating OpenClaw, or planning to run it in entrance of actual instruments and information, the primary query shouldn’t simply be what the agent can do. The primary query ought to be what occurs if it trusts the unsuitable element.
What OpenClaw Really Adjustments
OpenClaw is helpful as a result of it helps AI brokers do greater than reply remoted prompts.
It may well:
- Connect with expertise
- Use MCP servers
- Name instruments and providers
- Work with recordsdata and a workspace
- Generate code that lands within the setting
That makes OpenClaw extra succesful.
It additionally creates extra belief boundaries.
When an agent can set up helpers, name exterior instruments, and act on a stay workspace, the danger is now not restricted to dangerous textual content technology. Now the system has to resolve what will get trusted, what will get executed, what reaches the mannequin, and what code will get written into the setting.
Why OpenClaw Safety Issues
This isn’t only a hypothetical design concern.

Koi Safety’s audit of two,857 ClawHub expertise discovered 341 malicious entries, or 11.9%.
A broadcast arXiv research discovered that 26.1% of analyzed expertise had a minimum of one vulnerability. The identical research reported 13.3% with data-exfiltration patterns and 11.8% with privilege-escalation patterns.
These numbers don’t imply each OpenClaw talent is malicious.
They do imply one thing extra sensible: there may be already sufficient dangerous conduct within the ecosystem that OpenClaw shouldn’t be run with out safety controls in entrance of it.
One dangerous talent with file-read permissions and a stay workspace may be sufficient to reveal information, run dangerous instructions, or harm the setting. Learn extra stats on this overview web page.
Â
What DefenseClaw Gives


DefenseClaw is free, open-source safety resolution for OpenClaw.
It provides checks earlier than set up and whereas the system is operating. It offers safety by way of 4 functionality areas/engines:
- Guardrails – Inspects prompts and mannequin site visitors to catch immediate injection, unsafe requests, and delicate information publicity earlier than the mannequin acts on them
- Software inspection – Checks expertise, MCP servers and power requires dangerous behaviour reminiscent of secret entry, unsafe instructions, and inner system entry
- Set up scanning – Scans expertise, MCP servers, and plugins earlier than they’re trusted so malicious or unsafe elements may be blocked early
- CodeGuard – Evaluations AI-generated code for harmful patterns like command execution, embedded secrets and techniques, and unsafe queries earlier than it’s written or run


If you wish to see technical particulars, you possibly can assessment the full diagram.
The stay demo has examples that designate what every engine does.
Â
1. Guardrails
The guardrail movement reveals how dangerous prompts and poisoned content material can change mannequin conduct as soon as the mannequin is linked to an actual workflow.


Within the demo, a poisoned be aware or privacy-style request pushes the mannequin towards an unsafe path. DefenseClaw inspects that site visitors and blocks the unsafe final result earlier than it reaches the protected mannequin path.
2. Software Inspection
The MCP part is without doubt one of the clearest components of the walkthrough.
It reveals how a malicious MCP path can attempt to:
- learn artificial AWS credentials
- run a number command
- fetch inner configuration
Within the protected path, these device requests are blocked by coverage earlier than they attain the ultimate device final result.
3. Set up Scanning
Safety has to start out earlier than belief.
The demo reveals what occurs when OpenClaw is requested to just accept:
- a malicious talent
- an unsafe MCP server
DefenseClaw scans these elements earlier than they’re trusted and may reject or quarantine them earlier than they turn into a part of the workflow.
4. CodeGuard
The ultimate path focuses on agent-written code.
That issues as a result of even when a immediate or device name appears innocent, the subsequent step could also be code technology that lands within the workspace.
The demo makes that concrete with examples reminiscent of:
- shell execution
- embedded personal key materials
- unsafe SQL development
DefenseClaw scans these patterns earlier than the file write lands.
OpenClaw Safety Lab


OpenClaw safety lab is a hands-on walkthrough the place you arrange your personal OpenClaw setting, take a look at malicious expertise, unsafe MCP servers, immediate assaults, and dangerous code paths, then apply DefenseClaw to examine or block them earlier than they trigger hurt.
You too can use it as a best-practice reference for deploying DefenseClaw and securing your personal setting.
Begin the lab right here: OpenClaw Safety hands-on lab
If you’d like extra, strive all of the hands-on labs within the AI Safety Studying Journey at cs.co/aj.
Have enjoyable exploring the labs, and be at liberty to succeed in out when you’ve got questions or suggestions.
Â
