ClawJacked Bug Lets Websites Take Over Local OpenClaw Agents

What happened: Security researchers disclosed a flaw in OpenClaw’s local gateway that could let a malicious website connect to a developer’s localhost WebSocket and, after guessing the password, gain admin-level control of the running agent.

Why it matters: The risk isn’t just a data leak: once an attacker can pair as a trusted device, they can drive the agent, inspect configuration, enumerate connected nodes, and read logs — turning “I visited the wrong page” into full agent compromise.

Wider context: Agent runtimes concentrate credentials and permissions across tools, so their security model has to assume a bigger blast radius than a typical developer service — especially when browsers can reach localhost over WebSockets without the usual cross-origin protections.

Background: The report describes the exploit chain as relying on missing rate-limiting for localhost password attempts plus automatic approval of new device registrations from localhost. OpenClaw shipped a fix after responsible disclosure, advising users to update and audit granted access.


Singularity Soup Take: If your agent’s control plane treats “localhost” as inherently trustworthy, the browser becomes an attack surface by default — and the practical fix isn’t just patching one bug, but designing for hostile local origins and relentlessly minimizing standing privileges.

Key Takeaways:

  • Browser-to-Localhost Pivot: The attack described starts with a user visiting an attacker-controlled page, where JavaScript opens a WebSocket to a locally running OpenClaw gateway — something browsers allow even when cross-origin HTTP requests would be restricted.
  • Password Guessing Without Local Limits: Researchers said the gateway’s localhost path lacked rate limiting, enabling brute-force attempts against the gateway password until authentication succeeds.
  • Silent Device Trust: After authentication, the attacker can register as a trusted device that gets auto-approved from localhost without a user prompt, enabling ongoing admin-level interaction with the agent.
  • Patch and Hygiene Still Matter: OpenClaw released a fix (v2026.2.25, per the report) and urged users to update quickly, audit which devices have access, and apply governance controls for non-human identities that can act across connected systems.

Relevant Resources

Understanding AI Risks: What You Should Know — A practical primer on the kinds of failure modes and attack surfaces that become more important as software gains autonomy and access.

Your AI Privacy Guide: Protecting Yourself — Useful context on reducing exposure when tools and agents can touch personal accounts, devices, and local environments.