Home / Technology / OpenClaw: AI Runtime's Hidden Dangers Revealed
OpenClaw: AI Runtime's Hidden Dangers Revealed
25 Feb
Summary
- OpenClaw can execute dangerous actions using valid credentials.
- Persistent tokens allow subtle manipulations to go undetected.
- Running OpenClaw on standard workstations exposes critical data.

Microsoft security researchers have highlighted significant security risks associated with the OpenClaw AI agent runtime. This self-hosted system operates by blending untrusted instructions with executable code while utilizing legitimate credentials, a combination that bypasses traditional security boundaries on standard workstations.
OpenClaw is designed to perform various tasks, granting it broad access to online services, email accounts, local files, and APIs. Its capability to download external skills and maintain persistent tokens across sessions means it can automate complex workflows discreetly. This allows for subtle manipulations and data leakage without obvious signs of compromise.
Microsoft advises against running OpenClaw on standard personal or enterprise workstations due to its potential for credential exposure and configuration drift. For organizations intending to test OpenClaw, strict isolation within a dedicated virtual machine or a separate device is recommended. Limiting and regularly rotating credentials, along with continuous monitoring, are crucial steps to mitigate these invisible risks.




