What happened
OpenClaw was designed as a local-first personal assistant. When users deployed it to cloud VPS providers for always-on availability, the gateway port (18789) became internet-accessible — often without a firewall or authentication configured. Security researchers later found that ClawHub, the skill marketplace, contained 1,184 malicious skills, and a WebSocket vulnerability (CVE-2026-25253, “ClawJacked”, CVSS 8.8) allowed malicious websites to hijack local instances without user interaction. For a detailed timeline and analysis, see the Coral blog: The OpenClaw Security Crisis of 2026.Choose your path
Harden Your Instance
Keep your self-hosted OpenClaw instance and secure it with step-by-step hardening instructions.
Terminate Your Instance
Shut down your exposed instance entirely. Step-by-step instructions for every major cloud provider.
How Coral Protects You
See Coral’s security architecture: dedicated VMs, authenticated proxy layer, and server-side credential isolation.