Open Source

Contributions

We build security tools for the AI agent ecosystem and contribute them upstream. 7 PRs merged into OpenClaw (205K+ stars), 8 open-source tools published, 2,500+ lines of security code merged into projects used by millions.

7PRs merged upstream
8open-source tools
...all-time installs
205K+stars on projects we secure

npm Packages

Open-source security packages for the AI agent ecosystem.

Security scanner, red team toolkit, runtime protection, and benchmarks for AI agents. 204 security checks, 115 attack payloads, auto-fix, ARP monitoring, and OASB compliance scoring.

Keeps secrets out of AI context windows. PreToolUse hooks block credential access across Claude Code, Cursor, Copilot, and Windsurf.

Lightweight agent identity library. Ed25519 identity, local audit log, capability policy, and trust scoring. No server required.

Unified entry point for the OpenA2A security platform. Routes to HackMyAgent, Secretless, AIM, and all other tools through adapters.

Upstream Contributions

Security vulnerabilities we found, reported, and fixed in major open-source projects. All 7 PRs accepted by OpenClaw maintainers — 5 merged directly, 2 adopted into shared upstream modules.

OpenClaw205K+ starsFeatureMerged

Built-in Skill Security Scanner

February 6, 2026PR #980616 files · +1721 -94

Integrated a skill security scanner directly into OpenClaw’s skill lifecycle. Runs automatically when skills are installed or updated, blocking malicious patterns before execution.

ID
Check
SKILL-001
Unsigned SkillsDetects skills without cryptographic signatures
SKILL-002
Remote URL FetchingFlags code downloads at runtime
SKILL-003
Heartbeat InstallationIdentifies persistent background processes
SKILL-004
Filesystem Writes Outside SandboxCatches sandbox escape attempts
SKILL-005
Credential AccessDetects API key and token harvesting
SKILL-006
Data ExfiltrationFlags unauthorized external data transmission
Read the full write-up
OpenClaw205K+ starsSecurity FixMerged

Credential Redaction in config.get Gateway Responses

February 2026PR #98587 files · +669 -12

The config.get WebSocket method was returning all channel credentials in plaintext to any connected client. Built a redaction layer that masks sensitive fields across all supported channels.

ID
Check
CRED-001
Telegram Bot TokenRedacts bot tokens from config responses
CRED-002
Discord API TokenRedacts Discord bot credentials
CRED-003
Slack OAuth TokenRedacts Slack workspace tokens
CRED-004
WhatsApp Auth CredsRedacts WhatsApp authentication credentials
Read the full write-up
OpenClaw205K+ starsSecurity FixMerged

TOCTOU Path Traversal Fix in A2UI File Serving

February 2026PR #105253 files · +126 -36

The A2UI file serving endpoint used a two-step lstat + realpath check vulnerable to time-of-check/time-of-use (TOCTOU) race conditions. An attacker could swap a symlink between the check and the read to traverse outside the served directory. Replaced with atomic openFileWithinRoot.

ID
Check
PATH-001
Symlink Race ConditionEliminates TOCTOU window between check and read
PATH-002
Directory TraversalPrevents filesystem escape via symlink swap
Read the full write-up
OpenClaw205K+ starsSecurity FixMerged

World-Readable WhatsApp Credentials

February 2026PR #105293 files · +16 -0

The WhatsApp channel adapter was writing creds.json with default 0644 permissions, making credentials readable by any user on the system. Added chmodSync 0o600 to all 3 write paths to restrict access to the file owner only.

ID
Check
PERM-001
File Permission EnforcementRestricts credential files to owner-only (0600)
PERM-002
Write Path CoverageApplied to all 3 credential write locations
Read the full write-up
OpenClaw205K+ starsSecurity FixAdopted by Upstream

Timing Side-Channel in Hook Token Authentication

February 2026PR #10527

Hook token authentication used standard string comparison (===), which leaks token length and character values through timing differences. Proposed replacing with crypto.timingSafeEqual. The maintainers adopted the fix into a shared safeEqualSecret utility applied across all authentication paths.

ID
Check
TIME-001
Constant-Time ComparisonReplaces === with crypto.timingSafeEqual
TIME-002
Project-Wide AdoptionUpstream generalized fix into shared utility module
Read the full write-up
OpenClaw205K+ starsSecurity FixAdopted by Upstream

npm Lifecycle Script Attacks During Plugin Installation

February 2026PR #10528

Plugin and hook installation ran npm install without the --ignore-scripts flag, allowing malicious packages to execute arbitrary code during install via preinstall/postinstall lifecycle scripts. The maintainers adopted this fix into a shared installPackageDir utility, ensuring all npm install invocations now use --ignore-scripts by default.

ID
Check
NPM-001
Lifecycle Script BlockingAdds --ignore-scripts to all npm install calls
NPM-002
Centralized Install UtilityUpstream consolidated all install paths through one safe function
Read the full write-up
HackMyAgentSecurity ScannerReleased in v0.4.0

CVE-2026-25253 Automated Detection

February 5, 2026

First automated scanner to detect CVE-2026-25253 (CVSS 8.8), the OpenClaw WebSocket hijacking vulnerability exploited in the ClawHavoc campaign. Added 13 new checks bringing the total to 187.

ID
Check
CVE-001
Vulnerable OpenClaw VersionDetects unpatched OpenClaw installations
CVE-002
Control UI Origin RestrictionsChecks WebSocket origin validation
SUPPLY-005
C2 InfrastructureDetects known command-and-control endpoints
SUPPLY-006
Malware Payload FilenamesIdentifies known malicious file patterns
Read the full write-up