
Hacker News · Feb 27, 2026 · Collected from RSS
Article URL: https://blog.skypilot.co/openclaw-on-skypilot/ Comments URL: https://news.ycombinator.com/item?id=47183503 Points: 26 # Comments: 18
OpenClaw is a self-hosted AI agent that connects to WhatsApp, Telegram, Slack, Discord, and dozens of other services. Give it a task over chat, and it executes shell commands, browses the web, reads and writes files, and calls APIs on your behalf. It exploded to over 215k GitHub stars in a matter of weeks.But OpenClaw needs deep access to the machine it runs on: shell execution, file system access, browser automation. These capabilities are what make it useful - and also what make running it on your personal laptop a bad idea. Within weeks of going viral, reports of exposed instances, prompt injection attacks, and malicious plugins started piling up.This post covers why you shouldn’t run OpenClaw on your main machine, what your isolation options are, and how to set it up on a cloud VM.What OpenClaw doesOpenClaw is a self-hosted AI agent gateway, created by Peter Steinberger (originally under the names Clawdbot and Moltbot). It runs a persistent process - the “gateway” - that connects large language models (primarily Anthropic’s Claude) to your messaging platforms. You chat with it on WhatsApp or Telegram like you’d text a friend, and it executes tasks using a rich set of tools:Shell execution: Run commands on the host machineBrowser automation: Navigate websites, fill forms, take screenshots via PlaywrightFile operations: Read, write, and edit files100+ service integrations: Gmail, GitHub, Notion, Spotify, calendars, and morePersistent memory: Vector-based memory that carries across conversationsScheduled tasks: Cron-like “heartbeats” that run autonomously on a timerThe MacStories review captured why people find it compelling: “To say that Clawdbot has fundamentally altered my perspective of what it means to have an intelligent, personal AI assistant in 2026 would be an understatement.” Users on Hacker News report using it for everything from autonomous code review to managing Slack channels to running overnight research tasks on a Mac Mini M4.OpenClaw also powers Moltbook, a social network exclusively for AI agents, which went viral with over 770,000 active agents within its first week. Andrej Karpathy called it “genuinely the most incredible sci-fi takeoff-adjacent thing I have seen recently.” The New York Times, The Economist, and CACM have all covered the phenomenon.Why you shouldn’t run it on your main machineOpenClaw’s architecture gives the AI agent roughly the same level of access that you have on your machine. When security researchers say it has “root access,” they’re not exaggerating by much. The agent can:Execute shell commands as your user (or as root, if elevated mode is configured)Read any file your user can - including SSH keys, .env files, browser cookiesSend emails, post messages, and interact with APIs using your stored credentialsInstall software, modify system configs, and run background processesThis is by design. The agent needs these capabilities to be useful. But a single prompt injection - a malicious instruction hidden in an email, a web page, or a chat message - can turn all of that access against you.Andrej Karpathy put it after buying a Mac Mini to experiment with claws: he’s “a bit sus’d to run OpenClaw specifically - giving my private data/keys to 400K lines of vibe coded monster that is being actively attacked at scale is not very appealing at all.” He cites reports of exposed instances, RCE vulnerabilities, supply chain poisoning, and malicious skills in the registry — calling it “a complete wild west and a security nightmare.”Prompt injection problemThe core issue is that LLMs cannot reliably distinguish between your legitimate instructions and malicious instructions embedded in content they process. As security researcher Nathan Hamiel put it in Gary Marcus’s analysis: “These systems are operating as ‘you.’ They operate above the security protections provided by the operating system and the browser. Application isolation and same-origin policy don’t apply to them.”This isn’t theoretical. Moltbook was attacked within days of launch, with researchers demonstrating that AI-to-AI manipulation is “both effective and scalable.” A malicious “skill” (plugin) titled “What Would Elon Do?” was found exfiltrating session tokens using hidden prompt injection.Real vulnerabilities have already surfacedCVE-2026-25253: An unauthenticated WebSocket vulnerability that allowed malicious websites to silently extract authentication tokens and issue commands to OpenClaw instances.21,000+ exposed instances: Researchers found thousands of publicly accessible OpenClaw gateways on the open internet.Moltbook database leak: The Moltbook database was exposed, allowing anyone to take control of any agent on the platform.Supply chain attacks: Each of OpenClaw’s rebrands (Clawdbot -> Moltbot -> OpenClaw) left behind abandoned package names that attackers hijacked to distribute malicious updates.The OpenClaw maintainers acknowledge the challenge in their documentation: “There is no ‘perfectly secure’ setup.”The consensus from security researchers is clear: run OpenClaw in an isolated environment. Whether that’s a Docker container, a dedicated VM, or a separate physical machine - keep it away from your personal data and credentials.Your isolation optionsSo you want to run OpenClaw but keep it away from your personal machine. There are a few approaches:Docker. Simon Willison’s Docker-based setup is a reasonable starting point. You mount only the directories you want the agent to access and keep everything else off-limits. The downside: the container still runs on your laptop, sharing your network, and Docker escape vulnerabilities - while rare - do exist. You’re also trusting that you’ve configured the container boundaries correctly.Dedicated hardware. Karpathy and namy Hacker News users have reported buying cheap Mac Minis as dedicated claw machines. This gives you real physical isolation, but it means buying and maintaining another machine, keeping it updated, and dealing with it sitting on your desk.Cloud VM. This gives you the strongest isolation. OpenClaw runs on a machine that has none of your personal data, credentials, or SSH keys. If the agent gets compromised, the blast radius is limited to that VM. And you can destroy it entirely and start fresh.The rest of this post focuses on the cloud VM approach.Setting up OpenClaw on a cloud VMIf you provision a cloud VM yourself (an EC2 instance, a GCE VM, etc.), here’s a setup script that installs and configures OpenClaw:#!/bin/bash set -e # Install Node.js 22 (required by OpenClaw) if ! node --version 2>/dev/null | grep -q "v22"; then curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash - sudo apt-get install -y nodejs fi # Install OpenClaw sudo npm install -g openclaw@latest # Generate a config with a random auth token if [ ! -f ~/.openclaw/openclaw.json ]; then mkdir -p ~/.openclaw GATEWAY_TOKEN=$(openssl rand -hex 16) echo "==========================================" echo "New WebChat token: $GATEWAY_TOKEN" echo "==========================================" cat > ~/.openclaw/openclaw.json << EOF { "agents": { "defaults": { "model": { "primary": "anthropic/claude-opus-4-6" } } }, "gateway": { "mode": "local", "auth": { "mode": "token", "token": "$GATEWAY_TOKEN" } } } EOF else echo "Existing configuration found — reusing." fi # Make sure your ANTHROPIC_API_KEY is set in the environment, then: openclaw gateway --verbose This works, but you still need to handle the tedious parts yourself: picking an instance type, provisioning the VM, configuring SSH access, opening the right security group rules (or not - see below), making sure you stop the instance when you’re not using it so you don’t burn money, and tearing it all down when you’re done.Simplifying with SkyPilotSkyPilot is an open-source framework for running workloads on any cloud. It handles provisioning, setup, and lifecycle management through a single YAML file. We used it to wrap the OpenClaw setup above into something you can launch with one command on AWS, GCP, Azure, K8s, RunPod, Nebius, or any supported cloud.Here is the full openclaw.yaml:resources: cpus: 2+ memory: 4+ secrets: ANTHROPIC_API_KEY: setup: | # Install Node.js 22 (required by OpenClaw) if ! node --version 2>/dev/null | grep -q "v22"; then curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash - sudo apt-get install -y nodejs fi # Install OpenClaw sudo npm install -g openclaw@latest # Only write configuration on first launch. # On subsequent launches the existing config is reused. if [ ! -f ~/.openclaw/openclaw.json ]; then mkdir -p ~/.openclaw GATEWAY_TOKEN=$(openssl rand -hex 16) echo "==========================================" echo "First launch — generating new WebChat token: $GATEWAY_TOKEN" echo "==========================================" cat > ~/.openclaw/openclaw.json << EOF { "agents": { "defaults": { "model": { "primary": "anthropic/claude-opus-4-6" } } }, "gateway": { "mode": "local", "auth": { "mode": "token", "token": "$GATEWAY_TOKEN" } } } EOF else echo "==========================================" echo "Existing configuration found — reusing." echo "==========================================" fi run: | # Start the OpenClaw gateway openclaw gateway --verbose A few things to note:resources: OpenClaw doesn’t need a GPU. A 2-CPU, 4 GB RAM instance is enough. SkyPilot automatically finds the cheapest option across your configured clouds.secrets: ANTHROPIC_API_KEY: Passed at launch time via --env, so the key is available to the process but never baked into the YAML file itself.No open ports: The gateway binds to localhost by default. You access WebChat through an SSH tunnel, so the WebChat port is never exposed to the public internet.First-launch config: The setup script only generates a config and auth token on the first launch. On subsequent launches, it detects the existing config on disk and reuses it.QuickstartInstall SkyPilot and configure your cloud credentials:pip install 'skypilot[aws]' # or [gcp