NewsWorld
PredictionsDigestsScorecardTimelinesArticles
NewsWorld
HomePredictionsDigestsScorecardTimelinesArticlesWorldTechnologyPoliticsBusiness
AI-powered predictive news aggregation© 2026 NewsWorld. All rights reserved.
Trending
FebruaryChinaSignificantMilitaryTimelineDigestFaceDiplomaticFederalTurkeyFridayTrumpDrugGovernanceTensionsCompanyStateIranParticularlyEscalatingCaliforniaTargetingNuclearDespite
FebruaryChinaSignificantMilitaryTimelineDigestFaceDiplomaticFederalTurkeyFridayTrumpDrugGovernanceTensionsCompanyStateIranParticularlyEscalatingCaliforniaTargetingNuclearDespite
All Articles
Don't run OpenClaw on your main machine
Hacker News
Clustered Story
Published about 8 hours ago

Don't run OpenClaw on your main machine

Hacker News · Feb 27, 2026 · Collected from RSS

Summary

Article URL: https://blog.skypilot.co/openclaw-on-skypilot/ Comments URL: https://news.ycombinator.com/item?id=47183503 Points: 26 # Comments: 18

Full Article

OpenClaw is a self-hosted AI agent that connects to WhatsApp, Telegram, Slack, Discord, and dozens of other services. Give it a task over chat, and it executes shell commands, browses the web, reads and writes files, and calls APIs on your behalf. It exploded to over 215k GitHub stars in a matter of weeks.But OpenClaw needs deep access to the machine it runs on: shell execution, file system access, browser automation. These capabilities are what make it useful - and also what make running it on your personal laptop a bad idea. Within weeks of going viral, reports of exposed instances, prompt injection attacks, and malicious plugins started piling up.This post covers why you shouldn’t run OpenClaw on your main machine, what your isolation options are, and how to set it up on a cloud VM.What OpenClaw doesOpenClaw is a self-hosted AI agent gateway, created by Peter Steinberger (originally under the names Clawdbot and Moltbot). It runs a persistent process - the “gateway” - that connects large language models (primarily Anthropic’s Claude) to your messaging platforms. You chat with it on WhatsApp or Telegram like you’d text a friend, and it executes tasks using a rich set of tools:Shell execution: Run commands on the host machineBrowser automation: Navigate websites, fill forms, take screenshots via PlaywrightFile operations: Read, write, and edit files100+ service integrations: Gmail, GitHub, Notion, Spotify, calendars, and morePersistent memory: Vector-based memory that carries across conversationsScheduled tasks: Cron-like “heartbeats” that run autonomously on a timerThe MacStories review captured why people find it compelling: “To say that Clawdbot has fundamentally altered my perspective of what it means to have an intelligent, personal AI assistant in 2026 would be an understatement.” Users on Hacker News report using it for everything from autonomous code review to managing Slack channels to running overnight research tasks on a Mac Mini M4.OpenClaw also powers Moltbook, a social network exclusively for AI agents, which went viral with over 770,000 active agents within its first week. Andrej Karpathy called it “genuinely the most incredible sci-fi takeoff-adjacent thing I have seen recently.” The New York Times, The Economist, and CACM have all covered the phenomenon.Why you shouldn’t run it on your main machineOpenClaw’s architecture gives the AI agent roughly the same level of access that you have on your machine. When security researchers say it has “root access,” they’re not exaggerating by much. The agent can:Execute shell commands as your user (or as root, if elevated mode is configured)Read any file your user can - including SSH keys, .env files, browser cookiesSend emails, post messages, and interact with APIs using your stored credentialsInstall software, modify system configs, and run background processesThis is by design. The agent needs these capabilities to be useful. But a single prompt injection - a malicious instruction hidden in an email, a web page, or a chat message - can turn all of that access against you.Andrej Karpathy put it after buying a Mac Mini to experiment with claws: he’s “a bit sus’d to run OpenClaw specifically - giving my private data/keys to 400K lines of vibe coded monster that is being actively attacked at scale is not very appealing at all.” He cites reports of exposed instances, RCE vulnerabilities, supply chain poisoning, and malicious skills in the registry — calling it “a complete wild west and a security nightmare.”Prompt injection problemThe core issue is that LLMs cannot reliably distinguish between your legitimate instructions and malicious instructions embedded in content they process. As security researcher Nathan Hamiel put it in Gary Marcus’s analysis: “These systems are operating as ‘you.’ They operate above the security protections provided by the operating system and the browser. Application isolation and same-origin policy don’t apply to them.”This isn’t theoretical. Moltbook was attacked within days of launch, with researchers demonstrating that AI-to-AI manipulation is “both effective and scalable.” A malicious “skill” (plugin) titled “What Would Elon Do?” was found exfiltrating session tokens using hidden prompt injection.Real vulnerabilities have already surfacedCVE-2026-25253: An unauthenticated WebSocket vulnerability that allowed malicious websites to silently extract authentication tokens and issue commands to OpenClaw instances.21,000+ exposed instances: Researchers found thousands of publicly accessible OpenClaw gateways on the open internet.Moltbook database leak: The Moltbook database was exposed, allowing anyone to take control of any agent on the platform.Supply chain attacks: Each of OpenClaw’s rebrands (Clawdbot -> Moltbot -> OpenClaw) left behind abandoned package names that attackers hijacked to distribute malicious updates.The OpenClaw maintainers acknowledge the challenge in their documentation: “There is no ‘perfectly secure’ setup.”The consensus from security researchers is clear: run OpenClaw in an isolated environment. Whether that’s a Docker container, a dedicated VM, or a separate physical machine - keep it away from your personal data and credentials.Your isolation optionsSo you want to run OpenClaw but keep it away from your personal machine. There are a few approaches:Docker. Simon Willison’s Docker-based setup is a reasonable starting point. You mount only the directories you want the agent to access and keep everything else off-limits. The downside: the container still runs on your laptop, sharing your network, and Docker escape vulnerabilities - while rare - do exist. You’re also trusting that you’ve configured the container boundaries correctly.Dedicated hardware. Karpathy and namy Hacker News users have reported buying cheap Mac Minis as dedicated claw machines. This gives you real physical isolation, but it means buying and maintaining another machine, keeping it updated, and dealing with it sitting on your desk.Cloud VM. This gives you the strongest isolation. OpenClaw runs on a machine that has none of your personal data, credentials, or SSH keys. If the agent gets compromised, the blast radius is limited to that VM. And you can destroy it entirely and start fresh.The rest of this post focuses on the cloud VM approach.Setting up OpenClaw on a cloud VMIf you provision a cloud VM yourself (an EC2 instance, a GCE VM, etc.), here’s a setup script that installs and configures OpenClaw:#!/bin/bash set -e # Install Node.js 22 (required by OpenClaw) if ! node --version 2>/dev/null | grep -q "v22"; then curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash - sudo apt-get install -y nodejs fi # Install OpenClaw sudo npm install -g openclaw@latest # Generate a config with a random auth token if [ ! -f ~/.openclaw/openclaw.json ]; then mkdir -p ~/.openclaw GATEWAY_TOKEN=$(openssl rand -hex 16) echo "==========================================" echo "New WebChat token: $GATEWAY_TOKEN" echo "==========================================" cat > ~/.openclaw/openclaw.json << EOF { "agents": { "defaults": { "model": { "primary": "anthropic/claude-opus-4-6" } } }, "gateway": { "mode": "local", "auth": { "mode": "token", "token": "$GATEWAY_TOKEN" } } } EOF else echo "Existing configuration found — reusing." fi # Make sure your ANTHROPIC_API_KEY is set in the environment, then: openclaw gateway --verbose This works, but you still need to handle the tedious parts yourself: picking an instance type, provisioning the VM, configuring SSH access, opening the right security group rules (or not - see below), making sure you stop the instance when you’re not using it so you don’t burn money, and tearing it all down when you’re done.Simplifying with SkyPilotSkyPilot is an open-source framework for running workloads on any cloud. It handles provisioning, setup, and lifecycle management through a single YAML file. We used it to wrap the OpenClaw setup above into something you can launch with one command on AWS, GCP, Azure, K8s, RunPod, Nebius, or any supported cloud.Here is the full openclaw.yaml:resources: cpus: 2+ memory: 4+ secrets: ANTHROPIC_API_KEY: setup: | # Install Node.js 22 (required by OpenClaw) if ! node --version 2>/dev/null | grep -q "v22"; then curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash - sudo apt-get install -y nodejs fi # Install OpenClaw sudo npm install -g openclaw@latest # Only write configuration on first launch. # On subsequent launches the existing config is reused. if [ ! -f ~/.openclaw/openclaw.json ]; then mkdir -p ~/.openclaw GATEWAY_TOKEN=$(openssl rand -hex 16) echo "==========================================" echo "First launch — generating new WebChat token: $GATEWAY_TOKEN" echo "==========================================" cat > ~/.openclaw/openclaw.json << EOF { "agents": { "defaults": { "model": { "primary": "anthropic/claude-opus-4-6" } } }, "gateway": { "mode": "local", "auth": { "mode": "token", "token": "$GATEWAY_TOKEN" } } } EOF else echo "==========================================" echo "Existing configuration found — reusing." echo "==========================================" fi run: | # Start the OpenClaw gateway openclaw gateway --verbose A few things to note:resources: OpenClaw doesn’t need a GPU. A 2-CPU, 4 GB RAM instance is enough. SkyPilot automatically finds the cheapest option across your configured clouds.secrets: ANTHROPIC_API_KEY: Passed at launch time via --env, so the key is available to the process but never baked into the YAML file itself.No open ports: The gateway binds to localhost by default. You access WebChat through an SSH tunnel, so the WebChat port is never exposed to the public internet.First-launch config: The setup script only generates a config and auth token on the first launch. On subsequent launches, it detects the existing config on disk and reuses it.QuickstartInstall SkyPilot and configure your cloud credentials:pip install 'skypilot[aws]' # or [gcp


Share this story

Read Original at Hacker News

Related Articles

TechCrunchabout 9 hours ago
Perplexity’s new Computer is another bet that users need many AI models

Perplexity Computer, in the company’s words, "unifies every current AI capability into a single system."

Ars Technica1 day ago
Perplexity announces "Computer," an AI agent that assigns work to other AI agents

It's also a buttoned-down, ostensibly safer take on the OpenClaw concept.

Wired2 days ago
OpenClaw Users Are Allegedly Bypassing Anti-Bot Systems

An open source project called Scrapling is gaining traction with AI agent users who want their bots to scrape sites without permission.

TechCrunch2 days ago
OpenClaw creator’s advice to AI builders is to be more playful and allow yourself time to improve

Peter Steinberger talks about the creation of his viral AI agent OpenClaw and how being more "playful" makes for a better way to learn AI coding.

TechCrunch4 days ago
A Meta AI security researcher said an OpenClaw agent ran amok on her inbox

The viral X post from an AI security researcher reads like satire. But it's really a word of warning about what can go wrong when handing tasks to an AI agent.

Hacker News4 days ago
You are not supposed to install OpenClaw on your personal computer

Article URL: https://twitter.com/i/status/2025987544853188836 Comments URL: https://news.ycombinator.com/item?id=47129647 Points: 22 # Comments: 1