Security coverage around OpenClaw intensified with a report on indirect prompt injection and data exfiltration risks, while KiloClaw published an independent assessment of its hosted isolation layers. Review your default configs and sandbox boundaries before exposing agents to untrusted web or tenant data.

KiloCode’s posts point to a sharper claim than the usual "AI agents can be risky" warning: the issue is described as OpenClaw’s "inherently weak default security configurations," and the linked writeup says those weaknesses can enable prompt injection and data exfiltration in deployed agent environments research thread linked report. A separate post says CNCERT warned about attackers using "indirect prompt injection" against OpenClaw instances, which matters because indirect injection usually arrives through content the agent reads rather than through a direct operator prompt CNCERT warning.
That makes the practical risk boundary clear. If an OpenClaw agent can browse, ingest external text, or act across connected tools, then unsafe defaults become an implementation problem rather than a theoretical model-safety concern weak defaults.
KiloClaw answered the OpenClaw warnings with a security paper and architecture post rather than just a marketing denial. The whitepaper image says an independent assessment by Andrew Storms ran for 10 days and included PASTA-based threat modeling across "30 threats across 13 assets," plus code review, live infrastructure testing, and "60+ adversarial tests" security whitepaper.
According to KiloClaw’s architecture post, its hosted design uses Firecracker microVMs and five independent layers of tenant isolation, including identity-based routing, separate application environments, and WireGuard-based network isolation. Those are still vendor-provided claims, but they are at least concrete enough for engineers to compare against their own OpenClaw deployment model, especially around sandbox boundaries, cross-tenant separation, and secret exposure paths hosted isolation.
OpenClaw has "inherently weak default security configurations", according to new research.
99% of OpenClaw hosting providers claim their service “is secure.” Evidence > Claims KiloClaw doesn’t rely on claims alone. We stress-tested our OpenClaw hosting service across five layers of security risk to verify our claim, and published our findings in a whitepaper. Read Show more
KiloClaw is a hosted OpenClaw platform that was built to protect against attacks like these + more. Read more: blog.kilo.ai/p/how-kiloclaw…